27 research outputs found

    Dialogues with the dead : an osteological analysis of the palaeodemography and life history of the 18th and 19th century northern frontier in South Africa

    Get PDF
    Bibliography: leaves 170-187.Osteological, dental, and molecular analyses were conducted on remains from seven historical archaeological sites within South Africa. The emphasis was on the collection of lifestyle data for the purpose of adding to the unwritten history of indigenous South African peoples and to give voice to a once forgotten group of peoples. The demographic distribution reveals three different community dynamics: the Griqua sample are a pastoralist group incorporating some agricultural activities, the Colesberg individuals are an indigenous group resembling a migrant workers population living on the margins of society, and the Wolmaransstad demographics are suggestive of a Zabantu labouring community. All individuals are relatively healthy with low rates of dental disease and trauma and share similar growth patterns to living populations. However all of these individuals display high frequencies of porotic hyperostosis and cribra orbitalia, skeletal manifestations of iron deficiency anaemia. Many theories about the occurrence of anaemia are discussed and the hypothesis that, in these individuals, it is related to infection by the smallpox virus is investigated through the analysis of ancient DNA

    Privacy-preserving systems around security, trust and identity

    Get PDF
    Data has proved to be the most valuable asset in a modern world of rapidly advancing technologies. Companies are trying to maximise their profits by getting valuable insights from collected data about peopleā€™s trends and behaviour which often can be considered personal and sensitive. Additionally, sophisticated adversaries often target organisations aiming to exfiltrate sensitive data to sell it to third parties or ask for ransom. Hence, the privacy assurance of the individual data producers is a matter of great importance who rely on simply trusting that the services they use took all the necessary countermeasures to protect them.Distributed ledger technology and its variants can securely store data and preserve its privacy with novel characteristics. Additionally, the concept of self-sovereign identity, which gives the control back to the data subjects, is an expected future step once these approaches mature further. Last but not least, big data analysis typically occurs through machine learning techniques. However, the security of these techniques is often questioned since adversaries aim to exploit them for their benefit.The aspect of security, privacy and trust is highlighted throughout this thesis which investigates several emerging technologies that aim to protect and analyse sensitive data compared to already existing systems, tools and approaches in terms of security guarantees and performance efficiency.The contributions of this thesis derive to i) the presentation of a novel distributed ledger infrastructure tailored to the domain name system, ii) the adaptation of this infrastructure to a critical healthcare use case, iii) the development of a novel self-sovereign identity healthcare scenario in which a data scientist analyses sensitive data stored in the premises of three hospitals, through a privacy-preserving machine learning approach, and iv) the thorough investigation of adversarial attacks that aim to exploit machine learning intrusion detection systems by ā€œtrickingā€ them to misclassify carefully crafted inputs such as malware identified as benign.A significant finding is that the security and privacy of data are often neglected since they do not directly impact peopleā€™s lives. It is common for the protection and confidentiality of systems, even of critical nature, to be an afterthought, which is considered merely after malicious intents occur. Further, emerging sets of technologies, tools, and approaches built with fundamental security and privacy principles, such as the distributed ledger technology, should be favoured by existing systems that can adopt them without significant changes and compromises. Additionally, it has been presented that the decentralisation of machine learning algorithms through self-sovereign identity technologies that provide novel end-to-end encrypted channels is possible without sacrificing the valuable utility of the original machine learning algorithms.However, a matter of great importance is that alongside technological advancements, adversaries are becoming more sophisticated in this area and are trying to exploit the aforementioned machine learning approaches and other similar ones for their benefit through various tools and approaches. Adversarial attacks pose a real threat to any machine learning algorithm and artificial intelligence technique, and their detection is challenging and often problematic. Hence, any security professional operating in this domain should consider the impact of these attacks and the protection countermeasures to combat or minimise them

    Computational Transformation of the Public Sphere : Theories and Case Studies

    Get PDF
    This book is an edited collection of MA research paper on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidental election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage.Non peer reviewe

    Computational Transformation of the Public Sphere: Theories and Cases

    Get PDF
    This book is an edited collection of original research papers on the digital revolution of the public and governance. It covers cyber governance in Finland, and the securitization of cyber security in Finland. It investigates the cases of Brexit, the 2016 US presidential election of Donald Trump, the 2017 presidential election of Volodymyr Zelensky, and Brexit. It examines the environmental concerns of climate change and greenwashing, and the impact of digital communication giving rise to the #MeToo and Incel movements. It considers how digitilization can serve to emancipate women through ride-sharing, and how it leads to the question of robot rights. It considers fake news and algorithmic governance with respect to case studies of the Chinese social credit system, the US FICO credit score, along with Facebook, Twitter, Cambridge Analytica and the European effort to regulate and protect data usage

    Computational transformation of the public sphere : theories and case studies

    Get PDF
    Computational Transformation of the Public Sphere is the organic product of what turned out to be an effective collaboration between MA students and their professor in the Global Politics and Communication program in the Faculty of Social Sciences at the University of Helsinki, in the Fall of 2019. The course, Philosophy of Politics and Communication, is a gateway course into this MA program. As I had been eager to conduct research on the impact of new digital technologies and artificial intelligence (AI) on democratic governance, I saw this course as an opportunity to not only share, but also further develop my knowledge of this topic

    Models, services and security in modern online social networks

    Full text link
    Modern online social networks have revolutionized the world the same way the radio and the plane did, crossing geographical and time boundaries, not without problems, more can be learned, they can still change our world and that their true worth is still a question for the future

    Terrorist access to firearms in the Netherlands

    Get PDF

    Violence and Abuse in Intimate Dating Relationships: A Study of Young People's Attitudes, Perceptions and Experiences

    Get PDF
    ABSTRACT Since the issue of dating violence emerged onto the research agenda in the 1980s, researchers have focused upon measuring the prevalence of physical violence occurring in young peopleā€™s intimate relationships, using quantitative methods. Surveys, which have limited young peopleā€™s reporting to stating whether or not they have perpetrated or sustained any of a fixed range of predetermined violent acts, have formed the dominant methodological approach. In the main, dating violence studies have focused on researching university students in the United States of America, and young people not attending American universities are an under-researched population in the dating violence literature. The dearth of qualitative approaches to past studies of dating violence has meant that young peopleā€™s own accounts of their experiences, attitudes and perceptions of dating violence and abuse have been afforded minimal focus. Feminist theoretical approaches to dating violence research are now emerging, contributing a valuable gendered analysis of the issues. Through qualitative interviews with forty five young people aged 16-21 (23 men and 22 women), recruited primarily from a Further Education college and an organisation working with young people not in education, employment or training, this thesis explores young peopleā€™s attitudes, perceptions and experiences of violence and abuse in intimate dating relationships, through a feminist theoretical lens. The study is couched in a rich body of feminist empirical and theoretical literature, which conceptualises intimate partner violence as primarily an issue of menā€™s violence against women, perpetrated with the rationale of maintaining power and control. The impact that popular theoretical discourses of gender equality and female empowerment may have upon young peopleā€™s capacity to acknowledge ongoing gender inequalities is also considered in this thesis. The findings of the current research indicate that young peopleā€™s dating relationships (and experiences of heterosexuality in general) reflect ongoing gender inequalities which are influenced to a great extent by patriarchal modes of power and control. The accounts of young men and women in this study established dating relationships as sites of imbalanced gender power, with many modes of menā€™s power control, surveillance and monitoring of their girlfriends described as ā€˜normalā€™ and acceptable. There was a widespread perception among the participants that dating violence is an issue of ā€˜mutual combatā€™ where women are just as likely as men to be perpetrators, even though their experiences of dating violence largely reflected the pattern of female victims and male perpetrators. In regard to violence against women by men, many of the participants perceived menā€™s violence to be understandable in the face of womenā€™s provocation, particularly in cases where women are perceived to be ā€˜cheatingā€™. For a significant minority of young people, intimate relationships are sites of violence and abuse, with women disproportionately the victims. The findings from this study indicate a lack of awareness of the avenues of support that can be accessed by young people experiencing dating violence and abuse. The findings also highlight a requirement for direct educative strategies to challenge some young peopleā€™s support for menā€™s violence against women

    Fresh Perspectives on the 'War on Terror'

    Get PDF
    On 20 September 2001, in an address to a Joint Session of Congress and the American people, President George W Bush declared a ā€˜war on terrorā€™. The concept of the ā€˜war on terrorā€™ has proven to be both an attractive and a potent rhetorical device. It has been adopted and elaborated upon by political leaders around the world, particularly in the context of military action in Afghanistan and Iraq. But use of the rhetoric has not been confined to the military context. The ā€˜war on terrorā€™ is a domestic one, also, and the phrase has been used to account for broad criminal legislation, sweeping agency powers and potential human rights abuses throughout much of the world. This collection seeks both to draw on and to engage critically with the metaphor of war in the context of terrorism. It brings together a group of experts from Australia, Canada, the United Kingdom, France and Germany who write about terrorism from a variety of disciplinary perspectives including international law and international relations, public and constitutional law, criminal law and criminology, legal theory, and psychology and law

    Jewish Masculinity in the Holocaust

    Get PDF
    corecore