1,841 research outputs found
Two theoretical dimensions of the cyber hate crime
The impact and relationship between technologies and society establish the development of certain adaptive models, based on coexistence (Human-information-Machine), as well as several behavioral and cognitive changes of the human being, and new models of influence and social control through ubiquitous communication. which is the basis of a new social units called "virtual communities". The rupture of social norms that accompanies rapid social change, and subsequently the appearance of sub-cultural values establishes gaining status of participation in criminal activities, the components of social unites in general conform to social norms by social ties. the individuals or groups see themselves unfairly disadvantaged compared to other similar individuals, within physical-cybernetic ecosystem environment, which supports the interconnection and transformation of social phenomenon of digital dimension, with several implications in cyber hate crime. Thereby establishing the theoretical basis for further research looking which social vulnerability, identify the trajectory of the massive vector of impact "Information", which is a component of social cybernetics from the following three dimensions: (P) Propagation - (R) Replica - (C) Control called the "Cyber Hate Crime Pathway" that links hate crimes within the cyber-physical ecosystem, and where different types of social vulnerability are established. This study incorporates an epistemology approach of the relation between social and cybernetic theories, that will allow establishing a scientific base for future research in the field of new phenomena that will continue to appear within the Physical-Cybernetic ecosystem. It will also allow the contributions and implications to science derived from the product of this research establish a global holistic field applied to criminal justice system, academic and the new entities of social cybernetic
Asymmetry in Online Social Networks
Varying degrees of symmetry can exist in a social network's connections. Some early online social networks (OSNs) were predicated on symmetrical connections, such as Facebook 'friendships' where both actors in a 'friendship' have an equal and reciprocal connection. Newer platforms -- Twitter, Instagram, and Facebook's 'Pages' inclusive -- are counterexamples of this, where 'following' another actor (friend, celebrity, business) does not guarantee a reciprocal exchange from the other.
This paper argues that the basic asymmetric connections in an OSN leads to emergent asymmetrical behaviour in the OSN's overall influence and connectivity, amongst others. This paper will then draw on empirical examples from popular sites (and prior network research) to illustrate how asymmetric connections can render individuals 'voiceless'.
The crux of this paper is an argument from the existentialist viewpoint on how the above asymmetric network properties lead to Sartrean bad faith (Sartre, 1943). Instead of genuine interpersonal connection, one finds varying degrees of pressure to assume the Sartrean 'in-itself' (the en soi) mode-of-being, irregardless of the magnitude of 'followers' one has.
Finally, this paper poses an open question: what other philosophical issues does this inherent asymmetry in modern social networking give rise to
Vulnerability assessment of the Croatian cyberspace to information warfare campaign via means of malicious websites comments
Influencing masses is one way of achieving military and political goals. As seen in the U.S. 2016 election campaign, adversaries are prepared to go great length to test new ways of battle. When event such as terrorist attack or natural disaster strikes, people are prone to believe anything they see without questioning the source or truthfulness of information. This work focuses on researching steps necessary to be performed by adversaries aiming to perform influence operation by method of placing malicious comments on websites. Potential adversary must evaluate target, identify most relevant websites and analyse commenting systems to make decision how to exploit them. Once adversaries choose course of action, their next step is creation of trustworthy, in this case Facebook profiles, which later can be used for malicious operations. For purpose of testing this methodology, vulnerability assessment of the Croatian webspace is performed, and Facebook as a dominant platform for writing comments is identified. In conclusion a formula for estimation of workforce required for creation and maintenance of false Facebook profiles is given. Knowledge about adversaries’ action is essential for effective defence in hybrid warfare environment
Recommended from our members
“Software agents and haunted media : the twitter bot as political actor"
This report examines the rhetorical construction of Twitter bots as nonhuman political agents in press coverage of the 2016 U.S. election. It takes the rhetorical framing of “the Twitter bot” as a case study to argue that Twitter bots are a contemporary example of what media historian Jeffrey Sconce calls “haunted media” -- a communication technology that has been culturally ascribed an “uncanny” “agency.” First, this report provides a comparative close reading of two pieces from The Atlantic and The New York Times as examples of mainstream press coverage of bots shortly before and after the 2016 U.S. presidential election. Second, drawing on Sconce’s analysis of nineteenth and twentieth century media ecologies, it argues that “the Twitter bot” has been rhetorically constructed as haunted media through discourses that are inseparable from larger political narratives. The third and final section speculates on possible theoretical frameworks to expand this project in further inquiries. This report aims to demonstrate that haunted media narratives predate and persist beyond a specific election cycle or medium, and to argue that the construction of “haunted media” occurs alongside constructed concepts of democracy in our technologically mediated society. In doing so, this report contributes to the field of rhetoric of digital technology by bringing it further into conversation with political rhetoric.Englis
Towards Conceptualizing EU Cybersecurity Law. ZEI Discussion Paper C253 2019
The European Union has a wide spectrum of legal instruments
addressing various aspects of cybersecurity, ranging from electronic
communication laws, data protection regulations through network and
information security legislation to instruments dealing with
cybercrime and recommendations on coordinated response to large
scale cyber incidents – all this without having a commonly accepted
definition of cybersecurity
Social media, political polarization, and political disinformation: a review of the scientific literature
The following report is intended to provide an overview of the current state of the literature on the relationship between social media; political polarization; and political “disinformation,” a term used to encompass a wide range of types of information about politics found online, including “fake news,” rumors, deliberately factually incorrect information, inadvertently factually incorrect information, politically slanted information, and “hyperpartisan” news. The review of the literature is provided in six separate sections, each of which can be read individually but that cumulatively are intended to provide an overview of what is known — and unknown — about the relationship between social media, political polarization, and disinformation. The report concludes by identifying key gaps in our understanding of these phenomena and the data that are needed to address them
Social media, political polarization, and political disinformation: a review of the scientific literature
The following report is intended to provide an overview of the current state of the literature on the relationship between social media; political polarization; and political “disinformation,” a term used to encompass a wide range of types of information about politics found online, including “fake news,” rumors, deliberately factually incorrect information, inadvertently factually incorrect information, politically slanted information, and “hyperpartisan” news. The review of the literature is provided in six separate sections, each of which can be read individually but that cumulatively are intended to provide an overview of what is known — and unknown — about the relationship between social media, political polarization, and disinformation. The report concludes by identifying key gaps in our understanding of these phenomena and the data that are needed to address them
Love as Dialogue: Finding Human Connection In Conversation
Dialogue is a conversation situated in a view of existence as relational (Bakhtin, 1981; Buber, 1970). As a result, it evokes love—love as the constant companion to human experience that allows for collaboration, co-existence, and evolution (Maturana & Verden-Zöller, 2008). Dialogue, and its potential to generate love, offers persons the ability to understand how love can be activated within relationships and in daily encounters as a result of dialogical engagement. It also holds implications for the field of family therapy, including the nature and purpose of therapy, as well as training and practice. In order to understand how love and dialogue evoke one another, each was explored as a concept. Dialogism, the foundational philosophy of dialogue as articulated by its principle contributors, Mikhail Bakhtin (1981) and Martin Buber (1970), provides a relational, ontological context for dialogue as a conversation. Love, as an experience of shared humanity—as a “bumping into” humanity’s “collective consciousness” (Gumbrecht, Maturana, & Poerksen, 2006), initiates, fuels, and emerges within dialogue. Love and dialogue are foundational to human existence and therefore cannot be separated. This recognition results in an acceptance of love-as-dialogue. Love-as- dialogue presents individuals with a way of living that orients them toward engagement. It also invites family therapists into a conversation about therapy as a meeting of human beings and therefore as being situated in love
- …