To see the other types of publications on this topic, follow the link: Jihadist cyber - Digital identity.

Journal articles on the topic 'Jihadist cyber - Digital identity'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Jihadist cyber - Digital identity.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pradhuka, Briant Nor, Prahastiwi Utari, and Sudarmo Sudarmo. "Digital queer: identitas komunikasi genderqueer selebgram Mimi Peri." Jurnal Studi Komunikasi (Indonesian Journal of Communications Studies) 4, no. 1 (March 5, 2020): 143. http://dx.doi.org/10.25139/jsk.v4i1.1582.

Full text
Abstract:
Ahmad Jaelani, an Instagram influencer who adopted Mimi Peri as their new identity, plays a significant role in the emergence of digital queer phenomena in Indonesian cyber society. Ahmad Jaelani triggered the digital queer phenomena when he came out as gender queer. Jaelani’s brave act to adopt Mimi Peri identity resulted from various identity struggle. Before conforming to his new identity, he went through several stages, such as identity confusion, identity comparison, identity tolerance, identity acceptance, identity pride, and finally identity synthesis. He conveys his new identity through innovation and creativity, which are presented in several layers, such as personal layers, enactment layers, relational layers, and communal layers.
APA, Harvard, Vancouver, ISO, and other styles
2

Susanto, Edy, Lady Antira, Kevin Kevin, Edo Stanzah, and Assyeh Annasrul Majid. "MANAJEMEN KEAMANAN CYBER DI ERA DIGITAL." Journal of Business And Entrepreneurship 11, no. 1 (June 14, 2023): 23. http://dx.doi.org/10.46273/jobe.v11i1.365.

Full text
Abstract:
In this rapidly growing digital era, cyber security has become one of the most important aspects to pay attention to. Technological development information and communication has provided many benefits to our lives, they also present serious risks related to data security.. Cyber can be in the form of data theft, destruction systems, manipulation of information, or identity theft. First, cyberattacks are getting more complex and constantly evolving with time technology advances. Attackers can variety of methods and tools sophisticated way to exploit system vulnerabilities and gain access invalid. Second, cyber are often cross-border in nature, where attackers can operate overseas making difficult to identify and law enforcement. In addition, technological advances have also expanded attacks into new domains, such as the Internet of Things (IoT), autonomous vehicle systems, and artificial intelligence. Expanding connectivity between devices and internet-connected infrastructure increases security complexity cyber. However, it is important to remember that cyber security is not a challenge can't be overcome. In an effort to protect data and computer systems using various security strategies and measures can be implemented. With a combination of technical approaches, strong security policies, training user awareness, and cooperation between the parties involved, security cyber can be significantly improved.
APA, Harvard, Vancouver, ISO, and other styles
3

Mantello, Peter. "Fatal portraits: The selfie as agent of radicalization." Sign Systems Studies 49, no. 3-4 (December 31, 2021): 566–89. http://dx.doi.org/10.12697/sss.2021.49.3-4.16.

Full text
Abstract:
For the modern-day jihadist, the digital self-portrait or, more specifically, battlefield selfie is a popular tool for identity building. Similarly to the selfies taken by non-violent practitioners of self-capture culture, the jihadist selfie represents an alternative to the Cartesian formulation of a unitary and indivisible self. Rather, it is a product of social relations and performative actions, constituted in dialogue with others through very specific socio-cultural frameworks and expectations. However, unlike its non-violent Doppelgänger, the expectations of this dialogue are centred around a larger political agenda which actively seeks to reformat collective memories of imperial Islamic conquests and co-opt religion as a way to impose a moral order on its violence. Importantly, the battlefield selfie allows the jihadist easily to traverse the boundaries between two seemingly opposing belief systems. Although there exists a wealth of scholarship of self-capture culture, image sharing sites and micro-celebritism, their pervasive influence and practice on battlefield is understudied. This article draws from the personal histories of key Islamic extremists who were both lionized and demonized as a result of their battlefield micro-influencer practices. Today, however, the same individuals can achieve internet fame by participating in self-capture culture – posting selfies, videos or blogging. In other words, never before has a soldier’s public communication been so personal yet collective.
APA, Harvard, Vancouver, ISO, and other styles
4

Binhammad, Mohammad, Shaikha Alqaydi, Azzam Othman, and Laila Hatim Abuljadayel. "The Role of AI in Cyber Security: Safeguarding Digital Identity." Journal of Information Security 15, no. 02 (2024): 245–78. http://dx.doi.org/10.4236/jis.2024.152015.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khariroh, Riri. "Cyber Muslims." ISLAM NUSANTARA:Journal for the Study of Islamic History and Culture 3, no. 2 (July 31, 2022): 101–13. http://dx.doi.org/10.47776/islamnusantara.v3i2.375.

Full text
Abstract:
This new book is a study of Islam in the digital world, containing a collection of scientific articles written by 16 scholars about the increasingly interesting and complex phenomena of the global Islamic world. Most of the authors teach at various universities in the United States and Canada (North America), and the editor of this volume is Robert Rosehnal, Professor in the Department of Religion Studies and Founding Director of the Center for Global Islamic Studies at Lehigh University, Pennsylvania, USA. This interdisciplinary volume highlights cutting-edge research with unique perspectives and new insights into the evolving Islamic cyber landscape, presenting case studies from multiple geographic and cultural locations, and multiple languages ​​(Arabic, Persian, Indonesian and Spanish). The main sources of the authors, the analysis and interpretation they use is digital multimedia technology. These “virtual texts” include websites, podcasts, blogs, Twitter, Facebook, Instagram, YouTube, online magazines and discussion forums, and religious apps. Websites and social media platforms are living “texts” that are constantly evolving, shrinking, changing, and even disappearing, leaving no trace. In this sense, this book needs to be seen as a portrait—or, rather, a screenshot—of the complex and deformed cyber world of Islam at some point in its ongoing evolution. This book explores widely the digital expression of various Muslim communities in cyberspace, or iMuslims, related to the world of imams, clerics, and Sufis, feminists and fashionistas, artists and activists, spiritualists and online influencers. Several articles map the diversity and vibrancy of Islamic digital media against the backdrop of broader social trends in particular hot issues affecting Muslims living in Western countries: racism and Islamophobia, gender dynamics, celebrity culture, identity politics, and fashions of piety, and changing religious practices. The case studies presented in this book cover a wide cultural and geographical area, namely Indonesia, Iran, the Arab Middle East, and North America.
APA, Harvard, Vancouver, ISO, and other styles
6

Dahiya, Kashish. "Trends in Cyber Crime in India." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 6393–404. http://dx.doi.org/10.22214/ijraset.2023.53073.

Full text
Abstract:
Abstract: This research paper explores the trends in Cyber Crime in India, considering the country's rapidly growing digital landscape and the associated risks. The introduction provides an overview of the digital transformation in India and its dual impact, highlighting the alarming increase in Cyber Crime. One prominent trend discussed is the rise of phishing attacks, where cyber criminals employ deceptive tactics to trick individuals into revealing sensitive information. Another concerning trend is the proliferation of Ransomware attacks that target various sectors, causing significant financial losses and operational disruptions. Additionally, cyber fraud targeting financial transactions and digital payment systems has become prevalent. The paper also highlights the risks associated with social media platforms and online marketplaces, including identity theft and the sale of illegal goods and services. To address these escalating cyber threats, the paper emphasises the importance of prioritising cybersecurity measures, raising awareness about safe online practices, and establishing robust legal frameworks. The findings underscore the urgent need for individuals, organisations, and the government in India to work together to combat Cyber Crime effectively and secure the nation's digital future
APA, Harvard, Vancouver, ISO, and other styles
7

Shinkaretskaya, Galina Georgievna, and Alisa Mikhailovna Berman. "Cyber-attacks – an unlawful use of digital technologies." Международное право, no. 1 (January 2022): 40–50. http://dx.doi.org/10.25136/2644-5514.2022.1.37271.

Full text
Abstract:
This article notes that cyber-attacks, i.e. disruption of the information systems of persons, companies or countries, are a new type of criminal activity. International law does not yet have does not have normative documents that regulate the procedure of countering cyber-attacks. It is complicated by the fact that in the international law the grounds for taking coercive measures against other country is aggression (armed attack), which confers the right to individual or collective self-defense of the country. It is indicated that the doctrine legitimizes drawing parallels between common operation that are classified as the resorting to force, and the corresponding cyber operations. As the criterion of aggression, it is offered to use the assessment of the scale of attack and severity of consequences. The difficulty in qualifying the cyber-attack also lies in open architecture of the Internet, which allows billions of users worldwide to interact with each other. The aforementioned aspect also allows the hackers to hide their identity or even use someone else's device without their knowledge. All these difficulties aggravate if cyber operations are conducted by or on behalf of the countries. In fact, the cyber-attack participants do not bear any consequences for their actions. It is claimed that modern international law suggests both, intraterritorial or extraterritorial jurisdiction.
APA, Harvard, Vancouver, ISO, and other styles
8

Momcheva, Galina, Teodora Bakardjieva, Veselina Spasova, and Antonina Ivanova. "VARNA FREE UNIVERSITY’S PROJECTS FOR DEVELOPING OF CYBERSECURITY EDUCATION AND TRAINING – “CYBERMAGICIANS” PROJECT." Education and Technologies Journal 12, no. 2 (August 1, 2021): 516–18. http://dx.doi.org/10.26883/2010.212.3903.

Full text
Abstract:
Varna Free University has a tradition in teaching cyber security through bachelor’s, master’s and doctoral degrees and LLL (Lifelong Learning) courses for school teachers and students. The latest Cyberwizards project stems from the need to teach teachers and students how to protect themselves online, how to manage their digital identity, what types of information to publish. The university project aims to develop training courses and research methodologies to develop effective and sustainable cyber learning solutions aimed at digital protection and security.
APA, Harvard, Vancouver, ISO, and other styles
9

Chałubińska-Jentkiewicz, Katarzyna. "Digital Single Market. Cyber Threats and the Protection of Digital Contents: An Overview." Santander Art and Culture Law Review, no. 2 (6) (2020): 279–92. http://dx.doi.org/10.4467/2450050xsnr.20.020.13023.

Full text
Abstract:
Access to audio-visual and digitized heritage is crucial for the economy and overall well-being. It also offers important avenues for the development of creativity and intercultural dialogue, shaping people’s identity and contributing to cultural diversity. Yet the rise of the digital sector has also been accompanied by the proliferation of cyber or computer-related crime. Therefore, the harmonization of cybercrime legislation has widely been discussed in different international fora. At the same time, the protection of digital content has become a highly important issue in the context of the expanding policies aimed at ensuring public, open access to digitized resources for non-commercial, educational, and cultural purposes. This article offers an overview of these topical questions, with specific reference to the EU Digital Single Market.
APA, Harvard, Vancouver, ISO, and other styles
10

Betts, Lucy R., and Karin A. Spenser. "“A Large Can of Worms”." International Journal of Cyber Behavior, Psychology and Learning 5, no. 2 (April 2015): 15–29. http://dx.doi.org/10.4018/ijcbpl.2015040102.

Full text
Abstract:
Digital technology use is increasingly impacting on the lives of young people. To gain a deeper understanding of the perceived impact of young people's digital technology use, 2 focus groups were conducted with 14 teachers recruited from 2 schools. The focus groups were transcribed verbatim and analysed using Interpretative Phenomenological Analysis. The analysis revealed three themes: changing social dynamics, risk and (ir)responsible behaviour, and disclosure and reporting of cyber bullying. Participants discussed how digital technology was shaping young people's social identity and impacting on established norms when interacting in the social arena. A number of benefits were attributed to technology use but participants also recognised young people's naivety and tendency to anthropomorphise the internet. Finally, there was a perception that young people underreported their experiences of cyber bullying and some of the challenges faced when tackling cyber bullying were discussed.
APA, Harvard, Vancouver, ISO, and other styles
11

Ostrovskaya, Elena, Timur Badmatsyrenov, Fyodor Khandarov, and Innokentii Aktamov. "Russian-Speaking Digital Buddhism: Neither Cyber, nor Sangha." Religions 12, no. 6 (June 17, 2021): 449. http://dx.doi.org/10.3390/rel12060449.

Full text
Abstract:
The paper presents the results of a study that implemented a mixed methods approach to explore the question of correlation between online and offline activities of Buddhist organizations and communities in Russia. The research was carried out in 2019–2020 and addressed the following key issues: How do Buddhist websites and social media communities actually interact with offline organizations and Russian-speaking Buddhist communities? How do the ideological specifics of Buddhist organizations and communities influence their negotiations with the Internet and strategies towards new media technologies? Within the methodological frame of the religious–social shaping of technology approach by Heidi Campbell, we used the typology of religious digital creatives to reveal the strategies created by the Russian-speaking Buddhist communities developing their own identity, authority, and boundaries by means of digital technologies. In the first stage, we used quantitative software non-reactive methods to collect data from social media with the application of mathematical modeling techniques to build a graph model of Buddhist online communities in the vk.com social network and identify and describe its clusters. The second stage of the research combined biographical narratives of Buddhist digital creatives and expert interviews.
APA, Harvard, Vancouver, ISO, and other styles
12

Peteva, Irena, Daniela Pavlova, and Ivanka Pavlova. "The Impact of Cloud Technologies on Preserving and Promoting Cultural Identity." Digital Presentation and Preservation of Cultural and Scientific Heritage 13 (September 1, 2023): 269–74. http://dx.doi.org/10.55630/dipp.2023.13.26.

Full text
Abstract:
This study explores cloud technologies' role in cultural preservation and promotion, analyzing accessibility, collaboration, and cost-effectiveness. The paper identifies challenges, including the digital divide and cyber-security concerns, and emphasizes addressing them to harness cloud technologies' full potential in cultural heritage initiatives.
APA, Harvard, Vancouver, ISO, and other styles
13

Koulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (March 28, 2022): 119. http://dx.doi.org/10.12688/openreseurope.14010.2.

Full text
Abstract:
Next to land, water, air and space, cyberspace is the complex socio-technical setting often called the ‘fifth domain’. Nationalism has taken over the organization of the first four domains, in the form of constructing national states, national territorial waters and national airspace. The basic proposition of this article is that the ideology of nationalism has also infiltrated the fifth domain – cyberspace – in two ways. First, through state-led cyber-nationalism via official government websites that present ‘national’ achievements and propagate the official state positions on disputes about territory, symbols or history. Second, through individual communities who use the internet to sustain a sense of national belonging and/or to promote and disseminate their nationalist ideals. Both ways are important in an online national identity (re)production framework that, in a fluid, global, modern world, functions supportively towards the traditional national identity (re)production mechanisms. This article aims to examine the patterns of the nationalization of cyberspace through an analysis of state-led institutions and government websites that aim to enhance national identity and the sense of national belonging in a globalized world, as well as to propagate official state positions. It will focus on Greek, Dutch, US and Israeli websites. The term ‘nationalization’ in this context denotes the ideological charging of the cyber-footprint of the nation: how the internet produces and re-produces the nation, how the users partake in the national community by way of ‘consuming’ the digitalized national ideology, and the way cyber-nationalism defines people’s sense of belonging.
APA, Harvard, Vancouver, ISO, and other styles
14

Koulos, Thanos. "A digital territory to be appropriated: the state and the nationalization of cyberspace." Open Research Europe 1 (October 6, 2021): 119. http://dx.doi.org/10.12688/openreseurope.14010.1.

Full text
Abstract:
Next to land, water, air and space, cyberspace is the complex socio-technical setting often called the ‘fifth domain’. Nationalism has taken over the organization of the first four domains, in the form of constructing national states, national territorial waters and national airspace. The basic proposition of this article is that the ideology of nationalism has also infiltrated the fifth domain – cyberspace – in two ways. First, through state-led cyber-nationalism via official government websites that present ‘national’ achievements and propagate the official state positions on disputes about territory, symbols or history. Second, through individual communities who use the internet to sustain a sense of national belonging and/or to promote and disseminate their nationalist ideals. Both ways are important in an online national identity (re)production framework that, in a fluid, global, modern world, functions supportively towards the traditional national identity (re)production mechanisms. This article aims to examine the patterns of the nationalization of cyberspace through an analysis of state-led institutions and government websites that aim to enhance national identity and the sense of national belonging in a globalized world, as well as to propagate official state positions. It will focus on Greek, Dutch, US and Israeli websites. The term ‘nationalization’ in this context denotes the ideological charging of the cyber-footprint of the nation: how the internet produces and re-produces the nation, how the users partake in the national community by way of ‘consuming’ the digitalized national ideology, and the way cyber-nationalism defines people’s sense of belonging.
APA, Harvard, Vancouver, ISO, and other styles
15

Gerbaudo, Paolo. "From Cyber-Autonomism to Cyber-Populism: An Ideological Analysis of the Evolution of Digital Activism." tripleC: Communication, Capitalism & Critique. Open Access Journal for a Global Sustainable Information Society 15, no. 2 (May 29, 2017): 477–89. http://dx.doi.org/10.31269/triplec.v15i2.773.

Full text
Abstract:
The analysis of digital activism has so far been dominated by a techno-determinist approach which interprets the logic of activism and its transformation as directly reflecting the properties of the technologies utilised by activists. This line of interpretatoin has been manifested in the popularity acquired by notions as “Twitter protest” or “revolution 2.0” in the news media and in academic discourse. Moving beyond this reductionist trend, this article proposes an ideological approach to the study of digital activism and its hisstorical transformation, which can better account for the combination of political, cultural and social factors involved in shaping it. I identity two main waves of digital activism, corresponding not only to two phases of technological development of the internet (the so-called web 1.0 and web 2.0), but also to two different protest waves, the anti-globalisation movement, and the movement of the squares that began in 2011, each with its own dominant ideology. I argue that reflecting the seismic shift in perceptions and attitudes produced by the 2008 crash, and the connected shifts in social movement ideology, digital activism has moved from the margins to the centre, from a countercultural posture to a counterhegemonic ambition. I describe this turn as a transition from cyber-autonomism to cyber-populism as the two defining techno-political orientations of the first and second wave of digital activism. Reflecting the influence of neo-anarchism and autonomism in the anti-globalisation movement cyber-autonomism saw the Internet as an autonomous space where to construct a countercultural politics outside the mainstream. To the contrary cyber-populism, informed by the populist turn taken by 2011 and post-2011 movements, sees the Internet as a “popular space”, which needs to be appropriated by ordinary citizens, turned away from consumption activities and towards the purpose of popular mobilisation against the neoliberal elites. This shift that substantially modifies the way in which activists conceives of and utilise digital media goes a long way towards explaining the differences in digital activism practices, and their contrasting views of the internet as a tool and site of struggle.
APA, Harvard, Vancouver, ISO, and other styles
16

J.A Pakai, Asra. "PERAN PENDIDIKAN TERHADAP SISWA DALAM PENCEGAHAN PERILAKU CYBER BULLYING DI ERA DIGITAL." Moderasi: Jurnal Studi Ilmu Pengetahuan Sosial 2, no. 2 (December 30, 2021): 42–50. http://dx.doi.org/10.24239/moderasi.vol2.iss2.46.

Full text
Abstract:
Cyber ​​bullying is the impact of the development of technology that triggers an increase in internet use. The author discusses the role of education to students in preventing cyber bullying behavior in the digital era. Education currently refers to character education as regulated in Law Number 20 of 2003 concerning the National Education System which aims to form a strong personality in accordance with the identity of the Indonesian nation. The problem in this research: how is the role of education to students in preventing cyber bullying behavior in the digital era. Qualitative research methods. From the research above, it can be concluded that cases of cyber bullying among students have become commonplace in this digital era, especially in the free use of social media by students. For the student who becomes the perpetrator, this will be a joke, but it is different from the student who becomes a victim because it will have an impact until he grows up which can weaken his mentality so that he feels a victim of inferiority. This is where the important role of educators is to provide behavioral direction, good speech, mental motivation for victims.
APA, Harvard, Vancouver, ISO, and other styles
17

Sahren, Sahren, Irianto Irianto, and Afrisawati Afrisawati. "PELATIHAN SECURITY AWARNESS PENGGUNAAN MEDIA SOSIAL UNTUK PEMASARAN PADA KELOMPOK PENGRAJIN BATU BATA PULO BANDRING." Jurnal Pemberdayaan Sosial dan Teknologi Masyarakat 2, no. 2 (January 12, 2023): 181. http://dx.doi.org/10.54314/jpstm.v2i2.1091.

Full text
Abstract:
Abstract: Transformasi digital yang semakin meningkat akibat pandemi COVID-19 mengharuskan UMKM menggunakan media digital untuk menggantikan proses perdagangan tradisional. Transformasi digital tidak hanya berdampak positif, tetapi juga berdampak negatif. Di sisi lain, kejahatan dunia maya juga merupakan ancaman serius bagi transformasi digital. Meningkatnya serangan siber terhadap UMKM disebabkan karena UMKM dianggap sebagai target potensial karena kurang memperhatikan keamanan dan perlindungan data informasi, termasuk identitas pelanggan. Kecerobohan pengguna dalam mengakses internet dapat menimbulkan risiko dan kerugian tertentu. Kerugian tersebut antara lain terkait masalah privasi (user privacy), masalah terkait pendanaan UMKM, dan masalah etika. Dalam kegiatan PKM ini kami memperkenalkan Cyber Security Awareness kepada para pelaku UMKM Batu bata pulo bandring, dimana ini merupakan langkah awal dalam menyadarkan para pelaku UMKM akan bahaya proses perdagangan digital di Internet. Manfaat yang diperoleh pelaku UMKM dari kegiatan PKM ini adalah pengetahuan yang diperoleh tentang pentingnya kesadaran ancaman keamanan di dunia digital. UMKM juga memiliki pengetahuan untuk menghindari cybercrime. Keywords: Covid 19; Cyber Security Awarness.; UMKM Batu-bata; Abstrak: Increasing digital transformation due to the COVID-19 pandemic requires MSMEs to use digital media to replace traditional trading processes. Digital transformation has not only positive impacts, but also negative ones. On the other hand, cyber crime is also a serious threat to digital transformation. The increase in cyber attacks against MSMEs is due to the fact that MSMEs are considered a potential target due to their lack of attention to the security and protection of information data, including customer identity. User carelessness in accessing the internet can pose certain risks and losses. These losses include issues related to privacy (user privacy), problems related to MSME funding, and ethical issues. In this PKM activity, we introduce Cyber Security Awareness to the Pulo Bandring UMKM, which is the first step in making MSME players aware of the dangers of the digital trading process on the Internet. The benefit that MSME players get from this PKM activity is the knowledge gained about the importance of awareness of security threats in the digital world. MSMEs also have the knowledge to avoid cybercrime. Kata kunci: Covid 19; Cyber Security Awarness.; UMKM Batu-bata
APA, Harvard, Vancouver, ISO, and other styles
18

Antwi, Paul. "Device Information for Forensic Analysis." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (July 26, 2022): 373–78. http://dx.doi.org/10.22624/aims/crp-bk3-p59.

Full text
Abstract:
This document provides an overview of information for forensic analysis related to device name, serial number and model of devices used to connect to social networking platforms. The increasing use of social networking applications on smartphones makes these devices a gold mine for forensic researchers. Potential evidence can be captured on these devices and recovered with the right tools and research methods. The increasing proliferation of network devices in homes and buildings increases the possibilities of finding digital traces relevant to an investigation, physical or virtual: cyber-attacks, identity theft, etc. connected to the network can also find useful traces on the devices themselves found or stored in an associated cloud account that can be identified by device ID, model, and serial number. Keywords: Digital Forensics; Device Information, Evidence, Storage, Cyber forensics framework. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Paul Antwi (2022): Device Information for Forensic Analysis Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 373-378 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P59
APA, Harvard, Vancouver, ISO, and other styles
19

Lapadat, Judith C. "Bloggers on FIRE Performing Identity and Building Community: Considerations for Cyber-Autoethnography." International Review of Qualitative Research 13, no. 3 (October 12, 2020): 332–50. http://dx.doi.org/10.1177/1940844720939847.

Full text
Abstract:
As a research approach, autoethnography has revolutionized qualitative inquiry. To date, most autoethnographies represent the lives of academics and are published in the research press for a small audience of other academics. However, in the digital world, a subset of blogs has emerged in which the self-narratives are substantially similar to autoethnographies in content, quality, and level of social commentary, but with a broader scope and audience. For example, FIRE bloggers write about how they are striving to reach the goal of Financial Independence and Early Retirement (FIRE). They share detailed accounts of their financial circumstances, personal stories, strategies, and social insights. Through an analysis of FIRE blog texts, I examine digital presentation and performance of identity, relational aspects of online communication, and strategies these bloggers and their followers use to create community. The success of bloggers in bringing together people around the world to form communities with shared aims points to possibilities for how cyber-autoethnographers might broaden the reach of autoethnography while also building a collaborative sense of agency to accomplish personal and political goals. My interest in this cyber-community is theoretical, but intersects with challenges I have grappled with in my personal transition to retirement.
APA, Harvard, Vancouver, ISO, and other styles
20

Triberti, Stefano, Ilaria Durosini, Filippo Aschieri, Daniela Villani, and Giuseppe Riva. "Changing Avatars, Changing Selves? The Influence of Social and Contextual Expectations on Digital Rendition of Identity." Cyberpsychology, Behavior, and Social Networking 20, no. 8 (August 2017): 501–7. http://dx.doi.org/10.1089/cyber.2016.0424.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Ajitha, P., Malemarpuram Chaitanya Sai, Dheeraj, and A. Sivasangari. "A Joint Optimization Approach to Security- and Insurance Management System on Cloud." Journal of Computational and Theoretical Nanoscience 17, no. 11 (November 1, 2020): 4944–48. http://dx.doi.org/10.1166/jctn.2020.9245.

Full text
Abstract:
The fundamental point of this undertaking is to joined way to deal with protection and cyber insurance provisioning in the cloud based assets. Right now have introduced a joint way to deal with security and cyber insurance provisioning in the cloud. Utilizing a stochastic improvement, introduced a technique for ideally provisioning the two administrations despite vulnerability in regards to future valuing, approaching traffic and digital assaults. Hence, an application may make preparations for assaults by provisioning security administrations from suppliers, for example, Vast and Trend Micro. These administrations may take different structures; for example, secure information stockpiling, Identity Access Management (IAM), and interruption location administrations to mirror approaching traffic. And afterward cyber insurance is utilized to give express if malignant movement prompts money related misfortune. Protection inclusion might be first or outsider with, for example, burglary of cash and advanced resources, business interference, and digital blackmail, security breaks, loss of outsider information.
APA, Harvard, Vancouver, ISO, and other styles
22

Deri Firmansyah, Asep Achamd Rifa’i, Asep Suryana, and A Idun Suwarna. "SELF IDENTITY MANAGEMENT UMKM DALAM CYBERSPACE : PERSPECTIF PASCA TRANSFORMASI DIGITAL UMKM DI KAWASAN DESTINASI WISATA GEOPARK CILEUTUH." J-ABDI: Jurnal Pengabdian kepada Masyarakat 1, no. 6 (November 2, 2021): 1075–84. http://dx.doi.org/10.53625/jabdi.v1i6.529.

Full text
Abstract:
The ability of micro-enterprises (Mi) and small-enterprises (Se) to carry out digital transformation using social media cyberspace as their cyberpreneur in cyberspace is not supported by the ability to manage their identity, which triggers a lack of awareness of signs of account theft as well as data and identity obscuration. they. The purpose of community service activities is to provide training related to increasing digital literacy for self-identity management for Mi and Se actors who have carried out digital transformation to avoid cyber crime. The implementation method is carried out through the direct observation and training stages. This activity offers mentoring and training as solutions and approaches that are considered relevant. With this training they have additional knowledge and skills in the digital field that can increase understanding in managing self-identity, data and information in social media cyberspace, and can encourage more insight in marketing their products while promoting the tourist attraction of Geopark Cileutuh virtually, even more daring to try. enter a more global e-commerce platform and marketplace.
APA, Harvard, Vancouver, ISO, and other styles
23

Sydorenko, Svitlana. "The Development of Digitalization During the War as a Sociocultural Phenomenon." Mediaforum : Analytics, Forecasts, Information Management, no. 11 (December 14, 2022): 298–309. http://dx.doi.org/10.31861/mediaforum.2022.11.298-309.

Full text
Abstract:
The purpose of the article is to analyze the development of digitalization in the conditions of war as a socio-cultural phenomenon. It is noted that Ukraine continues to fight both in the digital and mental spaces for its own independence, originality, national identity and democratic future. The Ukrainian nation’s struggle for survival has reached a new level – digital. In the conditions of martial law, Ukrainian society is increasingly faced with various types of «cyber attacks» by aggressor countries: failures in the provision of electronic services, blocking of the work of state bodies, phishing attacks by e-mail, cybercrimes, violations of the integrity and confidentiality of data, informational and psychological pressure on population, cyber-terrorism, cyber-espionage, information expansion into the country’s national information space, blocking the work or destruction of enterprises strategically important for the economy and state security, life support systems and high-risk facilities. Modern digital technologies in the conditions of globalization are modernizing the strategies of warfare in the 21st century. In the conditions of martial law, Ukrainian society is increasingly faced with various types of «cyber attacks» by the aggressor country, including: blocking the work of state bodies, phishing attacks by e-mail, cyber crimes, violations of data integrity and confidentiality, information and psychological pressure on Ukrainians, cyber terrorism, cyber espionage, etc. Disinformation, anti-Ukrainian propaganda, fakes, racism, revanchism, political, material, spiritual violence that threaten the national security of our state can be spread through various «information channels» of the aggressor countries. But, on the other hand, in wartime conditions, Ukraine strives to protect the national information space from the negative effects of informational and psychological attacks and continues to implement the policy of digitalization and the introduction of digital technologies. Ukraine strives to protect the national information space, continues to implement the digitalization policy, implements the «State in a Smartphone» program, develops the IT sector that fulfills contracts, exports its own services, provides foreign exchange earnings, and also supports the Ukrainian economy. Provides services through the «Diia» state platform, including for internally displaced persons.
APA, Harvard, Vancouver, ISO, and other styles
24

S.Thangamayan, Et al. "Cyber Crime and Cyber Law’s In India: A Comprehensive Study with Special Reference to Information Technology." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2903–6. http://dx.doi.org/10.17762/ijritcc.v11i9.9379.

Full text
Abstract:
The rapid evolution of information technology has brought about significant advancements in various sectors, but it has also given rise to new challenges, particularly in the realm of cyber security. This study aims to provide a comprehensive overview of cybercrime and cyber laws in India, with a special emphasis on the Information Technology Act, 2000. The research begins by defining cybercrime and elucidating its various forms, including hacking, identity theft, phishing, and other malicious activities conducted in the digital domain. A detailed examination of the cyber threat landscape in India is presented, highlighting the increasing frequency and sophistication of cyber-attacks and their impact on individuals, businesses, and the government. The study then delves into the legislative framework governing cyber activities in India, primarily focusing on the Information Technology Act, 2000, and its subsequent amendments. It explores the legal definitions of cybercrimes, jurisdictional issues, and the powers conferred upon law enforcement agencies to investigate and prosecute offenders. Special attention is given to recent legal developments and case studies that illustrate the application of cyber laws in real-world scenarios. Furthermore, the research scrutinizes the role of government agencies, such as the Cyber Crime Cells, in combating cyber threats and promoting cyber security awareness. The study also assesses the effectiveness of international collaborations and treaties in addressing transnational cybercrimes, considering the borderless nature of cyber threats. The research investigates the role of Information Technology policies, standards, and best practices in India. It analyses the measures adopted by organizations to safeguard their digital assets and sensitive information, highlighting the importance of cyber security awareness and education. The study synthesizes the findings to provide recommendations for strengthening the existing cyber laws, enhancing cyber security infrastructure, and fostering a collaborative approach among stakeholders to mitigate the challenges posed by cybercrime. The research aims to contribute to the understanding of the dynamic landscape of cyber threats in India and serve as a valuable resource for policymakers, legal professionals, and academia involved in the field of information technology and cyber security.
APA, Harvard, Vancouver, ISO, and other styles
25

Apsimet, Nurdaulet, Akmaral Smanova, and Gulzat Utegenova. "The role of the Internet in the evolution of fraud: a historical aspect." BULLETIN of L.N. Gumilyov Eurasian National University LAW Series 146, no. 1 (2024): 247–57. http://dx.doi.org/10.32523/2616-6844-2024-1-247-257.

Full text
Abstract:
This article presents a thorough examination of how the Internet has altered the landscape of fraud, with particular focus on increasingly sophisticated digital schemes. It examines how the internet serves both criminals and cybersecurity efforts alike. Beginning with an exploration of fraud's historical roots from its early manifestations in pre-digital to digital times and continuing into modernity, this article details its development alongside technological progress. Utilizing various research methodologies (historical and statistical analysis), such as tracking its progression across time as well as any countermeasures implemented during that period.Significant findings of this research highlight the rise of internet-enabled fraud forms such as phishing, identity theft and cyber extortion; emphasizing their global and anonymous nature. Furthermore, research indicates the need for multidisciplinary approaches that combine technological, legislative and educational strategies in combatting internet fraud. This highlights machine learning technologies like artificial intelligence in detecting fraud along with greater public awareness campaigns to build cyber literacy literacy levels among society at large.
APA, Harvard, Vancouver, ISO, and other styles
26

Rizkil, Mia, Augustin Rina Herawati, and Slamet Santoso. "Protection of Personal Data in the Use of Digital ID Cards against Misuse of Data from Cyber Hack." Journal La Sociale 5, no. 2 (April 1, 2024): 471–78. http://dx.doi.org/10.37899/journal-la-sociale.v5i2.1132.

Full text
Abstract:
Data misuse from cyber hack in Indonesia is still high, judging from data leakage cases in Indonesia, from January to June 2023 there were 35 cases. Data leaks related to personal data on identity cards totaling 377 million data leaked until 2023, the data is contained on the dark web in the form of NIK, full name, date of birth, birth certificate number, blood type, religion, marital status and so on. Writing using a qualitative descriptive approach, this study uses literature studies, namely data collection techniques by conducting a review study of books, literature, records, and reports related to Digital ID cards and data security. This research also uses a fact approach, a case approach to data misuse by cyber hackers, and a statutory approach. The type of data used is secondary data. There are still many personal data leaks in various factors including human error, malware, system security weaknesses, insider threats, lack of security awareness. The impact of data leaks are fraud and identity theft, threatened privacy, financial fraud, national security threats. There are various alternative recommendations to minimize data leakage, this anticipation can be done by the community, students, and the government. This anticipation is in the form of changing passwords regularly, being careful in using applications or social media that have viruses, avoiding uploading photos of ID cards, conducting cyber security training, community empowerment, bureaucracy forming a special IT department responsible for building virtual protection systems, cooperation with third parties.
APA, Harvard, Vancouver, ISO, and other styles
27

Wang, Shipeng, Lizhen Cui, Lei Liu, Xudong Lu, and Qingzhong Li. "Projecting real world into CrowdIntell network: a methodology." International Journal of Crowd Science 3, no. 2 (August 30, 2019): 138–54. http://dx.doi.org/10.1108/ijcs-01-2019-0006.

Full text
Abstract:
Purpose The purpose of this paper is to build cyber-physical-psychological ternary fusion crowd intelligence network and realize comprehensive, real, correct and synchronous projection in cyber–physical–psychological ternary fusion system. Since the network of crowd intelligence is the future interconnected network system that takes on the features of large scale, openness and self-organization. The Digital-selfs in the network of crowd intelligence interact and cooperate with each other to finish transactions and achieve co-evolution eventually. Design/methodology/approach To realize comprehensive, real, correct and synchronous projection between cyber–physical–psychological ternary fusion system, the authors propose the rules and methods of projection from real world to the CrowdIntell Network. They build the mental model of the Digital-self including structure model and behavior model in four aspects: identity, provision, demand and connection, thus forming a theoretical mental model framework of Digital-self. Findings The mental model is excepted to lay a foundation for the theory of modeling and simulation in the research of crowd science and engineering. Originality/value This paper is the first one to propose the mental model framework and projection rules and methods of Digital-selfs in network of crowd intelligence, which lays a solid foundation for the theory of modeling, simulation, intelligent transactions, evolution and stability of CrowdIntell Network system, thus promoting the development of crowd science and engineering.
APA, Harvard, Vancouver, ISO, and other styles
28

Young, Oran R., Jian Yang, and Dan Guttman. "Meeting Cyber Age Needs for Governance in a Changing Global Order." Sustainability 12, no. 14 (July 10, 2020): 5557. http://dx.doi.org/10.3390/su12145557.

Full text
Abstract:
The advent of the cyber age has created a world in which digital systems, operating on their own and interacting with more conventional material or physical systems, have become an increasingly prominent feature of the landscape of human affairs. This development, affecting every aspect of human life, has generated a class of increasingly critical needs for governance that are difficult to address effectively within the confines of the current global order in which sovereign states compete to maximize their influence in the absence of any overarching public authority. These needs include concerns associated with the management of powerful digital technologies (e.g., artificial intelligence, robotics, machine learning, blockchain technology, the internet of things, and big data) as well as problems relating to the use of these technologies by many actors to exercise influence from the level of the individual (e.g., identity theft) to the level of international society (e.g., foreign interventions in national electoral systems). The challenge of meeting these needs prompts an analysis of processes leading to change in the prevailing global order, energized at least in part by the growing role of the digital systems of the cyber age. Our analysis includes both Western perspectives highlighting changes in the identity and behavior of key actors and Chinese perspectives emphasizing the spread of social narratives embedded in the concepts of tianxia and gongsheng. While it is premature to make explicit predictions, we conclude with some observations about the most important trends to watch regarding efforts to meet cyber age needs for governance, and we note the connections between these developments and the overarching challenge of fulfilling the suite of goals commonly associated with the idea of sustainable development.
APA, Harvard, Vancouver, ISO, and other styles
29

Stephen, Bijan. "Crime Online." Dissent 70, no. 3 (September 2023): 150–54. http://dx.doi.org/10.1353/dss.2023.a906672.

Full text
Abstract:
Abstract: The majority of property crimes are now cybercrimes—including identity theft, credit card fraud, and vari_ous kinds of cyber attacks—and they are on the rise. This development raises serious political questions. What are our digital rights, and how are they upheld? When we’re online, who’s in charge of protecting us? How are our institutions addressing the social transition to the internet?
APA, Harvard, Vancouver, ISO, and other styles
30

Nakamura, Lisa. "Cyberrace." PMLA/Publications of the Modern Language Association of America 123, no. 5 (October 2008): 1673–82. http://dx.doi.org/10.1632/pmla.2008.123.5.1673.

Full text
Abstract:
Remember cyber? surely one of the most irritating and ubiquitous prefixes of the nineties, cyber quickly became attached to all kinds of products (the Sony Cybershot camera), labor styles (cybercommuting), and communicative practices (cyberspace) that have now become so normalized as already digital that the prefix has dropped out of the language. Photography, work, and social discourse no longer need be flagged as cyber since we can more or less assume that in postindustrial, informationalized societies they usually are. Cyber migrated widely during the nineties, but the legal scholar Jerry Kang's article “Cyber-race,” which appeared in the Harvard Law Review in 2000, was the first to attach this prefix to race. Kang answers the question “can cyberspace change the very way that race structures our daily lives?” with an affirmative: “race and racism are already in cyberspace.” He then proposes three potential “design strategies” for lawmakers to deal with the problem of race and racism in cyberspace: the abolitionist approach, in which users take advantage of the Internet's anonymity as a means of preventing racism by hiding race; the integrationist approach, in which race is made visible in online social discourse; and the most radical one, the transmutation approach. Strategies for transmuting race in cyberspace reprise some of the discourse about identity and performativity that was often associated with Judith Butler—“it seeks racial pseudonymity, or cyber-passing, in order to disrupt the very notion of racial categories. By adopting multiple racialized identities in cyberspace, identities may slowly dissolve the one-to-one relationship between identity and the physical body” (1206).
APA, Harvard, Vancouver, ISO, and other styles
31

Lehto, Martti, Aki-Mauri Huhtinen, and Saara Jantunen. "The Open Definition of Cyber." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 1–9. http://dx.doi.org/10.4018/ijcwt.2011040101.

Full text
Abstract:
Security strategy work requires a definition for ’cyberspace’. This article discusses national definitions and analyses their contents. Defining what cyberspace is equals the exercise of political power. Therefore, it is important to discuss what the definitions mean in practice - whether cyberspace is seen as a restricted mathematical-technological domain or a social construction. Government publications highlight the technological aspect of cyberspace, whereas threats stem from human behaviour. For some, cyberspace is a primary operational environment for national security that must be protected with defensive and offensive military means. For others, cyberspace is primarily a digital civil society in which the free flow and usability of information and the identity and anonymity of citizens must be secured. Cyberspace can also be seen as a place for business, where material and immaterial products and services can be offered. The authors argue for the broad definition of cyberspace, incorporating both technological and social concepts. But cyberspace may never be comprehensively defined. If only a strictly technology-oriented approach is used to define cyberspace, many of its risks and problems cannot be addressed. Cyberspace allows the exercise of power; therefore, its definition should not be reduced to pure technology.
APA, Harvard, Vancouver, ISO, and other styles
32

Rahardi, R. Kunjana. "MEMERIKAN FUNGSI KONTEKS SITUASI DALAM PERSPEKTIF PRAGMATIK SIBER." Linguistik Indonesia 40, no. 2 (August 2, 2022): 197–211. http://dx.doi.org/10.26499/li.v40i2.286.

Full text
Abstract:
This research aims at describing the manifestation of situational contexts in the culture-specific pragmatic phenomena in the perspective of cyber-pragmatics. This is a qualitative research. The research data sources are authentic texts taken from social media captions containing situational contexts. The research data are elements of situational contexts found in the authentic utterances in social media captions. The research data are gathered using the observation method employing the note-taking technique. The gathered data are classified and typified to generate types of data in details. Then, the data are analyzed using the distributional analysis method and the pragmatic identity method. The distributional analysis method is used to analyze the linguistic dimensions of this research, while the pragmatic identity method, particularly extra-lingual identity, is applied to analyze the extra-linguistic dimensions of this research. The preliminary research results show that the situational contexts proposed by Geoffrey N. Leech need to be reinterpreted and redefined to adjust to the development of current situational contexts. Situational contexts are inseparable from the digital information technology because language is not immune from the impact of the technology development. Ignoring situational contexts in the perspective of cyber-pragmatics in studying language phenomena will not yield proper research results in the present-day contexts. Keywords: cyberpragmatics, culture-specific pragmatics, konteks situasi, informasi digital
APA, Harvard, Vancouver, ISO, and other styles
33

Kharisma, Rikha Ayu Minda, and Rahmawati Zulfiningrum. "REPRESENTASI CYBER SOCIETY DALAM FILM “SEARCHING”." Jurnal Audience 3, no. 2 (October 26, 2020): 250–72. http://dx.doi.org/10.33633/ja.v3i2.4066.

Full text
Abstract:
AbstrakMasyarakat cyber merupakan salah satu bentuk penciptaan budaya baru yang disebabkan oleh perkembangan teknologi informasi dan komunikasi. Teknologi saat ini memiliki banyak manfaat untuk membantu masyarakat dalam menyelesaikan aktivitas rutinnya, dimana digitalisasi telah terjadi di berbagai bidang dan menjadi kebiasaan baru masyarakat. Searching, salah satu film yang diproduksi tahun 2018 ini mengisahkan fenomena teknologi. Film tersebut menggambarkan bahwa menemukan orang hilang dengan rekam jejak digital adalah mungkin dan bisa menjadi jalan keluarnya. Lebih jauh, film ini tidak hanya menampilkan dampak positif dari teknologi tetapi juga menyuguhkan sisi negatifnya. Penelitian ini bertujuan untuk mengetahui representasi masyarakat cyber dalam film Searching. Peneliti menggunakan metode penelitian deskriptif kualitatif dengan model analisis semiotika Roland Barthes. Teori dalam penelitian ini menggunakan Teori Representasi Stuart Hall. Hasil penelitian menunjukkan bahwa terdapat lima representasi dari masyarakat cyber. Pertama, komunikasi yang menggunakan media aplikasi. Kedua, menciptakan identitas baru di dunia maya. Ketiga, menggunakan website untuk mencari informasi. Keempat, kebebasan berpendapat di dunia maya, dan yang terakhir adalah kecanduan internet. Masyarakat perlu meningkatkan kesadaran akan dampak penggunaan teknologi agar bisa hidup bijak di era digital. Kata kunci: Film searching, Masyarakat cyber, Representasi, Semiotika, Teknologi AbstractThe cyber society is a form of creating a new culture caused by the development of information and communication technology. Nowadays, technology bring the advantages to help people accomplished their routine activities, where digitalization has occurred in various fields and has become a new habit for society. Searching, one of the movies that produce in 2018 is portray the phenomenon of technology. The film described that finding the missing people with a digital track record is possible and could be the way out. Furthermore, this film not only show the positive impact of technology but also state the negative side. This study aims to determine the representations of cyber society in film title Searching. The researcher uses qualitative descriptive method research with semiotics of Roland Barthes analysis model. The theory in this study uses the theory representation of Stuart Hall. The results showed that there are five representations of cyber society. First, communication using media applications. Second, creating a new identity in cyberspace. Third, use the website to find information. Fourth, freedom of speech in cyberspace, and the last is internet addiction. The public needs to increase the awareness for the impacts of technology uses in order to live wisely in the digital era.Keywords: Cyber society, Representation, Searching movie, Semiotic, Technology
APA, Harvard, Vancouver, ISO, and other styles
34

Tavares, Carla Nunes Vieira. "Projeções identitárias no dizer sobre imigrantes das américas no Brasil." Cadernos de Linguagem e Sociedade 22, no. 2 (December 19, 2021): 62–78. http://dx.doi.org/10.26512/les.v22i2.32723.

Full text
Abstract:
Based on the French-Brazilian discourse analysis, this paper analyzes comments made on cyber news articles in digital news portals. It aims to problematize the Brazilian identity constitution in the confrontation with immigrants from the Americas, especially from Bolivia, Venezuela and Haiti. Although the researched articles from cyber news insist on the insignificance of the impact on the host country generated by this influx, the comments show an ambivalence of the Brazilian regarding the reception of immigrants. The gestures of interpretation have focused the referencing processes, particularly the designation (Guimarães, 2005), and imaginary formations (Pêcheux, [1975]1997), thus enabling to spot a discursive functioning that points out paranoiac traces on the Brazilian identity re-construction. Consequently, referring to some concepts from Freud-Lacanian psychoanalysis, the gestures of analysis discuss the dissonances between the structuring network of identifications of the Brazilian identity constitution and the immigration as a discursive event with the potential to weaken it. Perceptions of the Brazilian subject are evidenced in the sense of fixing and / or redefining the limits of oneself, as well as the protection and / or reaffirmation of identity.
APA, Harvard, Vancouver, ISO, and other styles
35

Cebrián-Robles, Violeta, Francisco José Ruíz-Rey, Manuela Raposo-Rivas, and Manuel Cebrián-de-la-Serna. "Impact of Digital Contexts in the Training of University Education Students." Education Sciences 13, no. 9 (September 11, 2023): 923. http://dx.doi.org/10.3390/educsci13090923.

Full text
Abstract:
The Internet is an important source of information and is a real ecosystem for learning that has provided important advances in education, although it has also generated problems, especially in terms of data security, identity theft, and cyber-plagiarism. During the COVID-19 pandemic, we had the opportunity to check levels of development in terms of infrastructures and digital competence, and subsequently detected serious problems in online assessment. In particular, the behaviour and digital competence of future teachers are essential, as they will inevitably be role models for their students. The present study analyses academic cyber-plagiarism derived from digital ecosystems during the pandemic in the academic work of pre-service teachers, advancing studies and warnings regarding Artificial Intelligence as a new learning ecosystem. A validated online questionnaire is used that considers the digital context surrounding training both during and after the pandemic. For the factor analysis, both descriptive and correlational, 324 responses from three Spanish universities are analysed. The confirmatory factor analysis reports four factors: the digital context of the pandemic as an opportunity for plagiarism, the response of the educational community to plagiarism, and both the unconscious and intentional misuse of sources. It is concluded that the digital context of the pandemic provided an opportunity for academic plagiarism, conscious or unconscious, with a clear distinction according to gender and the degree of reference. Finally, it is recommended to promote students’ digital skills to avoid risks such as cyber-plagiarism or authorship theft, using institutional repositories that can provide students with prominence by safely and ethically publishing their intellectual creations. Similarly, national policies are required to address advances in AI in education.
APA, Harvard, Vancouver, ISO, and other styles
36

Nie, Haolan. "Gender Inequality in the Digital Field and Potential Remedial Measures." Lecture Notes in Education Psychology and Public Media 21, no. 1 (November 20, 2023): 52–57. http://dx.doi.org/10.54254/2753-7048/21/20230050.

Full text
Abstract:
This paper examines the phenomenon of gender inequality in digital spaces and explores potential remedial measures. Through an analysis of historical cases of online discrimination, gendered experiences on the internet, and current landscape of discriminatory behavior, it is clear that women are frequently exposed to cyber bullying and other forms of abuse. Strategies for promoting gender equity in digital spaces include self-regulation, education and awareness, state legislation, and industry practices. Surveillance capitalisms impact on gender equity is also discussed, as data collected through this practice can be used to profile individuals based on their gender identity or sexuality. The paper concludes by stating that research into the efficacy of self-regulation, education and awareness approaches as well as state legislation in shielding women from online discrimination is necessary. Additionally, industry practices targeting those who battle discrimination should be further investigated. By utilizing such methods, one can move towards an equitable digital space where all individuals are respected regardless of gender identity or sexual orientation.
APA, Harvard, Vancouver, ISO, and other styles
37

Casadei, Roberto, Danilo Pianini, Mirko Viroli, and Danny Weyns. "Digital Twins, Virtual Devices, and Augmentations for Self-Organising Cyber-Physical Collectives." Applied Sciences 12, no. 1 (December 30, 2021): 349. http://dx.doi.org/10.3390/app12010349.

Full text
Abstract:
The engineering of large-scale cyber-physical systems (CPS) increasingly relies on principles from self-organisation and collective computing, enabling these systems to cooperate and adapt in dynamic environments. CPS engineering also often leverages digital twins that provide synchronised logical counterparts of physical entities. In contrast, sensor networks rely on the different but related concept of virtual device that provides an abstraction of a group of sensors. In this work, we study how such concepts can contribute to the engineering of self-organising CPSs. To that end, we analyse the concepts and devise modelling constructs, distinguishing between identity correspondence and execution relationships. Based on this analysis, we then contribute to the novel concept of “collective digital twin” (CDT) that captures the logical counterpart of a collection of physical devices. A CDT can also be “augmented” with purely virtual devices, which may be exploited to steer the self-organisation process of the CDT and its physical counterpart. We underpin the novel concept with experiments in the context of the pulverisation framework of aggregate computing, showing how augmented CDTs provide a holistic, modular, and cyber-physically integrated system view that can foster the engineering of self-organising CPSs.
APA, Harvard, Vancouver, ISO, and other styles
38

Ruta Vaidya, Trupti Gaikwad, Snehal Jadhav, and Jyoti Malusare. "Study of Cyber Crimes Using Data Science." international journal of engineering technology and management sciences 7, no. 5 (2023): 480–86. http://dx.doi.org/10.46647/ijetms.2023.v07i05.059.

Full text
Abstract:
In today’s technological advancements in the digital world cybercrime has caused unprecedented challenges to individuals and organizations. Cybercrime is an acronym used to describe illicit activity where a computer or network serves as the source, tool of the crime. Cybercrime includes advanced unlawful activities like fraud, the trafficking of child pornography and other intellectual property, identity theft, and privacy violations. A rise in data has been correlated with a rise in incidents of data theft. Worldwide, organizations and individuals are increasingly concerned about hacking and system intrusion using various technologies. Data science is the study of data to extract useful business insights. It is a path of interdisciplinary access for analyzing enormous amounts of data that brings together information and techniques from the domains of artificial intelligence, statistics, mathematics, and computer engineering. In this paper, the data has been collected from Indian Government sites and studied for different states and metropolitan cities. Using different data science techniques along with the statistical methods like correlation, hypothesis testing, some conclusions have been drawn for various motives of cybercrimes.
APA, Harvard, Vancouver, ISO, and other styles
39

Khan, Tayyeb. "Cybersecurity Problem Impacting Online Banking in FR Peshawar." Journal of Education and Finance Review 1, no. 1 (December 30, 2022): 43–54. http://dx.doi.org/10.62843/jefr/2022.3477305.

Full text
Abstract:
This study examines cyber security vulnerabilities that affect Pakistani internet banking. This research aims to do this. The banking industry's weaknesses and risks must be examined now more than ever. This tendency is due to the rapid rise of digital technologies and Internet banking. This report examines Pakistan's online banking industry's cyber security. Prospective dangers and mitigation strategies are also considered to improve online banking platform security. The latest research shows that online banking in Pakistan is harmful. Seventy college and university students completed an online questionnaire. The survey was online. SPSS 21 was used to analyse the data. SPSS calculates ANOVA and coefficients. The study found that phishing, identity theft, and hacking affect Internet banking, but other factors also affect it.
APA, Harvard, Vancouver, ISO, and other styles
40

Vilic, Vida. "Phishing as a form of fraud identity theft in healthcare: Victimization during COVID-19 pandemic." Temida 25, no. 1 (2022): 53–78. http://dx.doi.org/10.2298/tem2201053v.

Full text
Abstract:
The coronavirus pandemic affects all segments of human life around the world. Due to the risk to people's health, personal communication has been completely changed and most professional activities and contacts must take place in a cyber environment, with the help of computers and mobile telephony. On-line communication and the use of social networks undoubtedly represent a conditio sine qua non in a situation when compliance with numerous preventive measures are required, including the work from home, online teaching in schools, a ban on gatherings etc. The positive aspects of this kind of communication are undoubtedly obvious and necessary, but they also created new forms of victimization due to insecure protocols for sending e-mails, inadequate level of privacy protection, insufficient information security, the existence of so-called security holes and the use of the same devices and digital services for professional and private purposes. Hacking phishing activities during the pandemic mostly endangered the security of confidential data collected within medical information systems, educational institutions, and in the field of banking, when the user is expected to compromise his/her digital identity and publish his/her data. The subject of this paper is the presentation of some of the most common phishing activities and identity theft in the field of health care, provision of health services, procurement of medicines and vaccines against coronavirus, which have been recorded in the world since the beginning of the pandemic. The phishing activities that will be presented in this paper significantly contribute to the further spread of panic from the misuse of medical data of infected persons and their contacts. The paper aims to point out the most common forms of victimization that have appeared around the world, as a consequence of cyber security violations due to hacker attacks during the COVID- 19 pandemic. Special emphasis in the paper is on these ?pandemic? cyber dangers, as well as on the mechanisms for avoiding this type of victimization.
APA, Harvard, Vancouver, ISO, and other styles
41

Febriani, Meina, Nas Haryati Setyaningsih, and Azis Nugroho. "Konstruksi Baru Identitas Banyumasan dalam Penggunaan Bahasa Pada Generasi Y: Studi Kasus Platform Instagram." Jurnal Sastra Indonesia 11, no. 1 (March 26, 2022): 1–11. http://dx.doi.org/10.15294/jsi.v11i1.54126.

Full text
Abstract:
Transformasi kehidupan abad 21 makin mengubah pola komunikasi masyarakat menuju komunikasi virtual berbasis siber. Platform Instagram menjadi salah satu wahana ekspresi bahasa yang sebagian besar digunakan oleh Generasi Y/Milenial kelahiran 1981-1995. Tantangan terbesar dalam komunikasi berbasis siber ialah ketika identitas kultural yang melekat dalam penggunaan bahasa (salah satunya bahasa Jawa dialek Banyumas yang berciri cablaka) harus dihadapkan pada ekosistem siber. Inilah problematik bahasa di media sosial. Penelitian ini berfokus pada penjelasan konstruksi identitas Banyumasan dalam komunikasi di Instagram, sebagai fenomena pemertahanan bahasa di satu segi dan fenomena masyarakat global di segi yang lain. Penelitian ini menggunakan pendekatan kualitatif melalui analisis konten digital dengan menggunakan observasi virtual sebagai taknik utamanya serta didukung dengan kajian dokumen digital dalam komunikasi siber. Secara metodologis, analisis data akan dilakukan menggunakan model alir dengan mencakup tiga alir terpadu, yaitu: (1) reduksi data, (2) penyajian data, dan (3) verifikasi. Penelitian ini memberikan kontribusi teoretik berupa pemetaan ruang berbahasa Jawa dialek Banyumas (BJB) dalam platform Instagram, konstruksi baru identitas Banyumasan dalam penggunaan bahasa di ruang virtual, dan eksistensi bahasa Jawa dialek Banyumasan di media sosial. Secara praktis, hasil penelitian ini dapat memberi kontribusi langsung bagi masyarakat Banyumas, para peneliti bahasa, serta Badan Perlindungan dan Pengembangan Bahasa dalam upaya pemertahanan kekayaan kultural pada era industri 4.0. The transformation of life in the 21st century is increasingly changing people's communication patterns towards cyber-based virtual communication. The Instagram platform is a vehicle for language expression, which is mostly used by Generation Y/Millennials born in 1981-1995. The biggest challenge in cyber-based communication is when the cultural identity inherent in the use of language (one of which is the Banyumas Javanese dialect which is characterized by cablaka) must be faced with the cyber ecosystem. This is the language problem in social media. This study focuses on explaining the construction of Banyumasan identity in communication on Instagram, as a phenomenon of language defense on the one hand and a phenomenon of global society on the other. This study uses a qualitative approach through digital content analysis using virtual observation as the main technique and is supported by the study of digital documents in cyber communication. Methodologically, data analysis will be carried out using a flow model that includes three integrated flows, namely: (1) data reduction, (2) data presentation, and (3) verification. This research provides a theoretical contribution in the form of mapping the Javanese language space with the Banyumas dialect (BJB) on the Instagram platform, the new construction of the Banyumasan identity in the use of language in virtual spaces, and the existence of the Banyumasan Javanese dialect on social media. Practically, the results of this study can make a direct contribution to the Banyumas community, language researchers, and the Language Protection and Development Agency in an effort to maintain cultural wealth in the industrial era 4.0.
APA, Harvard, Vancouver, ISO, and other styles
42

Aamna Rafiq. "Challenges of Securitising Cyberspace in Pakistan." Strategic Studies 39, no. 1 (April 24, 2019): 90–101. http://dx.doi.org/10.53532/ss.039.01.00126.

Full text
Abstract:
With the rapid developments in the cyberspace domain, Pakistan has emerged as one of the fastest growing digital economies in the world. Pakistan’s internet penetration and teledensity are increasing exponentially, resulting in greater global connectivity. However, this connectivity has become a tool and target of conflict, crime and crisis which varies with respect to nature, occurrence and power. Pakistan is exposed to multidimensional cyber threats like computer malware, identity theft, economic data theft, cyber frauds and espionage attempts on critical infrastructures. However, the state institutions are ineffective to formulate a comprehensive national cybersecurity framework to counter these threats. This paper provides an in-depth analysis of the nature and severity of these cyber threats to the national security of Pakistan. It identifies the incorrect media framing of cybersecurity initiatives, the absence of relevant institutions, wide scope security debates, traditional security culture and non-inclusion of the audience as the major challenges to the successful securitisation of cyberspace in Pakistan.
APA, Harvard, Vancouver, ISO, and other styles
43

S, Smys, Haoxiang Wang, and Abul Basar. "5G Network Simulation in Smart Cities using Neural Network Algorithm." March 2021 3, no. 1 (March 29, 2021): 43–52. http://dx.doi.org/10.36548/jaicn.2021.1.004.

Full text
Abstract:
The speed of internet has increased dramatically with the introduction of 4G and 5G promises an even greater transmission rate with coverage outdoors and indoors in smart cities. This indicates that the introduction of 5G might result in replacing the Wi-Fi that is being currently used for applications such as geo-location using continuous radio coverage there by initiating the involvement of IoT in all devices that are used. The introduction of Wi-Fi 6 is already underway for applications that work with IoT, smart city applications will still require 5G to provide internet services using Big Data to reduce the requirement of mobile networks and additional private network infrastructure. However, as the network access begins to expand, it also introduces the risk of cyber security with the enhanced connectivity in the networking. Additional digital targets will be given to the cyber attackers and independent services will also be sharing access channel infrastructure between mobile and wireless network. In order to address these issues, we have introduced a random neural network blockchain technology that can be used to strengthen cybersecurity in many applications. Here the identity of the user is maintained as a secret while the information is codified using neural weights. However, when a cyber security breach occurs, the attacker will be easily tracked by mining the confidential identity. Thus a reliable and decentralized means of authentication method is proposed in this work. The results thus obtained are validated and shows that the introduction of the random neural network using blockchain improves connectivity, decentralized user access and cyber security resilience.
APA, Harvard, Vancouver, ISO, and other styles
44

Devlekar, Sanket, and Vidyavati Ramteke. "Identity and Access Management: High-level Conceptual Framework." Revista Gestão Inovação e Tecnologias 11, no. 4 (August 24, 2021): 4885–97. http://dx.doi.org/10.47059/revistageintec.v11i4.2511.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization's boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization's information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO, and other styles
45

S., Devlekar,, and Ramteke, V. "Identity and Access Management: High-level Conceptual Framework." CARDIOMETRY, no. 24 (November 30, 2022): 393–99. http://dx.doi.org/10.18137/cardiometry.2022.24.393399.

Full text
Abstract:
Information security is shifting from a traditional perimeter-based approach to an identity-based approach where the organization’s boundaries are where their digital identities exist. The organization has multiple stakeholders having access to various organization resources. Systems and applications are part of organization resources that help them achieve their business goals. These systems and applications are internally or externally exposed to allow all stakeholders to have seamless access, thus making identity and access management a big challenge. Identity and Access Management (IAM) is a fundamental part of information security. It plays a critical role in keeping the organization’s information security posture resilient to cyber attacks. This paper will identify various components of an IAM solution that are essential and should be considered while implementing and assessing the IAM solution and provides a high-level IAM framework that will allow information security professionals to assess the IAM security posture of an organization.
APA, Harvard, Vancouver, ISO, and other styles
46

Taufik, Zulfan, and Muhammad Taufik. "Mediated Tarekat Qadiriyah wa Naqshabandiyah in the Digital Era: An Ethnographic Overview." ESENSIA: Jurnal Ilmu-Ilmu Ushuluddin 22, no. 1 (May 29, 2021): 35. http://dx.doi.org/10.14421/esensia.v22i1.2511.

Full text
Abstract:
This article examines how Tarekat Qadiriyah wa Naqshabandiyah (TQN) utilizes online media to strengthen its existence. As an integral part of the Islamic revival in Indonesia, Sufi orders (tarekat) are facing remarkable challenges and opportunities in maintaining their existence in the digital era. Nevertheless, previous studies observed Sufi orders as a traditional community that would be exterminated by the pace of modernization and globalization. This article argues that Sufi orders may survive in the internet of things era, contrary to preceding discourses. Based on ethnography research, both online and offline, the authors found out that the vitality of the Sufi order can adapt, develop, and innovate using online media. TQN's use of online media through various platforms proves Sufi order’s adaptive efforts to the internet-based era. TQN’s online media provide informations on Islamic and Sufism teachings, news, schedule of activities, and fundraising. Even though TQN members’ being active in cyber-Islamic environments, they resist online asceticism thus leverage the vertical-personal obedience, conservative authorities, and sacred rituals. These practices done by TQN members illuminate its identity as an authentic online sufism. Premises shown in this paper may enrich the scope of study within the relationship of Sufi orders and Islamic-cyber environment, especially in Indonesian context.
APA, Harvard, Vancouver, ISO, and other styles
47

V. Smrithy, Singh, Robin D. Doreen, and Robin C. R. Rene. "A censorious interpretation of cyber theft and its footprints." i-manager's Journal on Information Technology 12, no. 1 (2023): 23. http://dx.doi.org/10.26634/jit.12.1.19394.

Full text
Abstract:
Cybercrime is a type of crime that steals information from an owner and uses it for criminal purposes. There are other types of theft related to this crime, including identity theft, data theft, and deep fakes. This study provides a detailed analysis of cybercrime. The world has become more advanced in communication, especially after the invention of the internet, which provides a feasible environment for online dealings such as e-shopping, internet banking, and online payments. Although progress has been made to enhance innovation and development, there is a high risk of cybercrime worldwide. It has had a significant impact on digital platforms, adding both positives and negatives to global networking systems. Internet technology has been used by a few people for criminal activities, such as unauthorized access to networks and scams. These criminal activities or offences related to the internet, referred to as cybercrimes, are discussed in this paper.
APA, Harvard, Vancouver, ISO, and other styles
48

Salwa Shakir Mahmood, Et al. "Enhancing Network Security Through Blockchain Technology: Challenges And Opportunities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 10 (November 2, 2023): 1670–77. http://dx.doi.org/10.17762/ijritcc.v11i10.8729.

Full text
Abstract:
The rapid proliferation of digital technologies has ushered in an era where network security is of paramount importance. Traditional security mechanisms have proven insufficient in protecting sensitive data and critical infrastructure from an ever-evolving landscape of cyber threats. Blockchain technology, originally designed to underpin cryptocurrencies like Bitcoin, has emerged as a promising solution for enhancing network security. Blockchain's core principles of decentralization, immutability, and transparency offer a unique approach to addressing vulnerabilities and mitigating risks in the digital realm. This paper examines how blockchain can enhance data integrity, authentication, and authorization processes, thereby fortifying the security posture of networks and systems. The paper discusses real-world applications and case studies where blockchain has been successfully implemented to bolster network security, such as supply chain management, identity verification, and secure communication protocols. These examples highlight the tangible benefits and opportunities that blockchain presents for organizations seeking to safeguard their digital assets and operations. In conclusion, this abstract underscore the pivotal role that blockchain technology can play in enhancing network security. By addressing challenges head-on and capitalizing on the opportunities it offers, organizations can build resilient, transparent, and secure digital ecosystems that protect against an ever-increasing array of cyber threats. The exploration of blockchain's potential in this context is critical for shaping the future of network security in our interconnected world.
APA, Harvard, Vancouver, ISO, and other styles
49

Rinta Ariani, Mahayu, Wahyu Widodo, and Toebagus Galang Windi Pratama. "Juridicial Review of Legal Protection Victims of Cyber Gender-Based Violence (Case Study of High Court Decision Number 150/PID/2020/PT BDG)." Widya Pranata Hukum : Jurnal Kajian dan Penelitian Hukum 5, no. 1 (March 3, 2023): 66–73. http://dx.doi.org/10.37631/widyapranata.v5i1.846.

Full text
Abstract:
Cyber gender-based violence is a crime that arises due to the development of increasingly sophisticated information technology. In this case, women are more vulnerable to cyber gender-based violence than men. This cyber gender-based violence results in a person's freedom not only being threatened directly in the real world but also in cyberspace, especially the difficulty of identifying the identity of the perpetrator and the victim's digital footprint that has been spread on the internet is difficult to erase. This study aims to determine the legal protection provided by the state to victims of cyber gender-based violence and to determine whether the High Court Decision Number 150/PID/2020/PT BDG has provided protection for victims of cyber gender-based violence. The approach method used in this research is normative juridical research method with qualitative descriptive research specifications. The techniques used to collect data are literature study and documentation study. Based on the research that has been conducted, it is concluded that the protection of victims of cyber gender-based violence is regulated in Law Number 12 of 2012 concerning Criminal Acts of Sexual Violence, which in this law regulates the criminal provisions of the perpetrators and the rights of victims, in this case victims are entitled to restitution, recovery services, and protection, where the fulfillment of these rights is an obligation of the state. And based on the analysis of the decision of the High Court Decision Number 150/PID/2020/PT BDG, it has not provided maximum protection to victims of cyber gender-based violence due to overlapping regulations which cause unclear legal protection for victims of cyber gender violence, especially the existence of rubber articles in the ITE Law which have become a tool to criminalize victims of cyber gender-based violence
APA, Harvard, Vancouver, ISO, and other styles
50

Mishra, Pankaj, and Dev Ratna Singh. "Biometric Approach for Confidentiality in Cloud Computing." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 10, no. 01 (July 25, 2018): 65–70. http://dx.doi.org/10.18090/samriddhi.v10i01.9.

Full text
Abstract:
Nowadays, progress in technology have made life simple by giving us higher levels of knowledge through the innovation of various devices. However, all technical invention harbours the potential of invisible threats to its users. One leading danger is theft of private information and data. As digital database get more prevailing, user’s attempt to prevent their data with extremely encrypted Identity cards and passwords. However, the abuse and theft of these security measures are on the rise. Taking benefit of security fault in Identity cards result in the cards gets duplicated and get misused. This increasing conflict of the cyber safety has lead to the start of biometric security method. Defining the main variation between the methods of biometric system used to verify user identity will focus on the benefits and limitations of personal data security systems.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography