1,841 research outputs found

    Two theoretical dimensions of the cyber hate crime

    Get PDF
    The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components of social unites in general conform to social norms by social ties. the individuals or groups see themselves unfairly disadvantaged compared to other similar individuals, within physical-cybernetic ecosystem environment, which supports the interconnection and transformation of social phenomenon of digital dimension, with several implications in cyber hate crime. Thereby establishing the theoretical basis for further research looking which social vulnerability, identify the trajectory of the massive vector of impact "Information", which is a component of social cybernetics from the following three dimensions: (P) Propagation - (R) Replica - (C) Control called the "Cyber Hate Crime Pathway" that links hate crimes within the cyber-physical ecosystem, and where different types of social vulnerability are established. This study incorporates an epistemology approach of the relation between social and cybernetic theories, that will allow establishing a scientific base for future research in the field of new phenomena that will continue to appear within the Physical-Cybernetic ecosystem. It will also allow the contributions and implications to science derived from the product of this research establish a global holistic field applied to criminal justice system, academic and the new entities of social cybernetic

    Asymmetry in Online Social Networks

    Get PDF
    Varying degrees of symmetry can exist in a social network's connections. Some early online social networks (OSNs) were predicated on symmetrical connections, such as Facebook 'friendships' where both actors in a 'friendship' have an equal and reciprocal connection. Newer platforms -- Twitter, Instagram, and Facebook's 'Pages' inclusive -- are counterexamples of this, where 'following' another actor (friend, celebrity, business) does not guarantee a reciprocal exchange from the other. This paper argues that the basic asymmetric connections in an OSN leads to emergent asymmetrical behaviour in the OSN's overall influence and connectivity, amongst others. This paper will then draw on empirical examples from popular sites (and prior network research) to illustrate how asymmetric connections can render individuals 'voiceless'. The crux of this paper is an argument from the existentialist viewpoint on how the above asymmetric network properties lead to Sartrean bad faith (Sartre, 1943). Instead of genuine interpersonal connection, one finds varying degrees of pressure to assume the Sartrean 'in-itself' (the en soi) mode-of-being, irregardless of the magnitude of 'followers' one has. Finally, this paper poses an open question: what other philosophical issues does this inherent asymmetry in modern social networking give rise to

    Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments

    Get PDF
    Influencing masses is one way of achieving military and political goals. As seen in the U.S. 2016 election campaign, adversaries are prepared to go great length to test new ways of battle. When event such as terrorist attack or natural disaster strikes, people are prone to believe anything they see without questioning the source or truthfulness of information. This work focuses on researching steps necessary to be performed by adversaries aiming to perform influence operation by method of placing malicious comments on websites. Potential adversary must evaluate target, identify most relevant websites and analyse commenting systems to make decision how to exploit them. Once adversaries choose course of action, their next step is creation of trustworthy, in this case Facebook profiles, which later can be used for malicious operations. For purpose of testing this methodology, vulnerability assessment of the Croatian webspace is performed, and Facebook as a dominant platform for writing comments is identified. In conclusion a formula for estimation of workforce required for creation and maintenance of false Facebook profiles is given. Knowledge about adversaries’ action is essential for effective defence in hybrid warfare environment

    Towards Conceptualizing EU Cybersecurity Law. ZEI Discussion Paper C253 2019

    Get PDF
    The European Union has a wide spectrum of legal instruments addressing various aspects of cybersecurity, ranging from electronic communication laws, data protection regulations through network and information security legislation to instruments dealing with cybercrime and recommendations on coordinated response to large scale cyber incidents – all this without having a commonly accepted definition of cybersecurity

    Social media, political polarization, and political disinformation: a review of the scientific literature

    Get PDF
    The following report is intended to provide an overview of the current state of the literature on the relationship between social media; political polarization; and political “disinformation,” a term used to encompass a wide range of types of information about politics found online, including “fake news,” rumors, deliberately factually incorrect information, inadvertently factually incorrect information, politically slanted information, and “hyperpartisan” news. The review of the literature is provided in six separate sections, each of which can be read individually but that cumulatively are intended to provide an overview of what is known — and unknown — about the relationship between social media, political polarization, and disinformation. The report concludes by identifying key gaps in our understanding of these phenomena and the data that are needed to address them

    Social media, political polarization, and political disinformation: a review of the scientific literature

    Get PDF
    The following report is intended to provide an overview of the current state of the literature on the relationship between social media; political polarization; and political “disinformation,” a term used to encompass a wide range of types of information about politics found online, including “fake news,” rumors, deliberately factually incorrect information, inadvertently factually incorrect information, politically slanted information, and “hyperpartisan” news. The review of the literature is provided in six separate sections, each of which can be read individually but that cumulatively are intended to provide an overview of what is known — and unknown — about the relationship between social media, political polarization, and disinformation. The report concludes by identifying key gaps in our understanding of these phenomena and the data that are needed to address them

    Love as Dialogue: Finding Human Connection In Conversation

    Get PDF
    Dialogue is a conversation situated in a view of existence as relational (Bakhtin, 1981; Buber, 1970). As a result, it evokes love—love as the constant companion to human experience that allows for collaboration, co-existence, and evolution (Maturana & Verden-Zöller, 2008). Dialogue, and its potential to generate love, offers persons the ability to understand how love can be activated within relationships and in daily encounters as a result of dialogical engagement. It also holds implications for the field of family therapy, including the nature and purpose of therapy, as well as training and practice. In order to understand how love and dialogue evoke one another, each was explored as a concept. Dialogism, the foundational philosophy of dialogue as articulated by its principle contributors, Mikhail Bakhtin (1981) and Martin Buber (1970), provides a relational, ontological context for dialogue as a conversation. Love, as an experience of shared humanity—as a “bumping into” humanity’s “collective consciousness” (Gumbrecht, Maturana, & Poerksen, 2006), initiates, fuels, and emerges within dialogue. Love and dialogue are foundational to human existence and therefore cannot be separated. This recognition results in an acceptance of love-as-dialogue. Love-as- dialogue presents individuals with a way of living that orients them toward engagement. It also invites family therapists into a conversation about therapy as a meeting of human beings and therefore as being situated in love
    • …
    corecore