scholarly journals Detection of Malicious Intent in Non-cooperative Drone Surveillance

Author(s):  
Jiaming Liang ◽  
Bashar I. Ahmad ◽  
Mohammad Jahangir ◽  
Simon Godsill
Keyword(s):  
Author(s):  
Sakshi Dhall ◽  
Ashutosh Dhar Dwivedi ◽  
Saibal K. Pal ◽  
Gautam Srivastava

With social media becoming the most frequently used mode of modern-day communications, the propagation of fake or vicious news through such modes of communication has emerged as a serious problem. The scope of the problem of fake or vicious news may range from rumour-mongering, with intent to defame someone, to manufacturing false opinions/trends impacting elections and stock exchanges to much more alarming and mala fide repercussions of inciting violence by bad actors, especially in sensitive law-and-order situations. Therefore, curbing fake or vicious news and identifying the source of such news to ensure strict accountability is the need of the hour. Researchers have been working in the area of using text analysis, labelling, artificial intelligence, and machine learning techniques for detecting fake news, but identifying the source or originator of such news for accountability is still a big challenge for which no concrete approach exists as of today. Also, there is another common problematic trend on social media whereby targeted vicious content goes viral to mobilize or instigate people with malicious intent to destabilize normalcy in society. In the proposed solution, we treat both problems of fake news and vicious news together. We propose a blockchain and keyed watermarking-based framework for social media/messaging platforms that will allow the integrity of the posted content as well as ensure accountability on the owner/user of the post. Intrinsic properties of blockchain-like transparency and immutability are advantageous for curbing fake or vicious news. After identification of fake or vicious news, its spread will be immediately curbed through backtracking as well as forward tracking. Also, observing transactions on the blockchain, the density and rate of forwarding of a particular original message going beyond a threshold can easily be checked, which could be identified as a possible malicious attempt to spread objectionable content. If the content is deemed dangerous or inappropriate, its spread will be curbed immediately. The use of the Raft consensus algorithm and bloXroute servers is proposed to enhance throughput and network scalability, respectively. Thus, the framework offers a proactive as well as reactive, practically feasible, and effective solution for curtailment of fake or vicious news on social media/messaging platforms. The proposed work is a framework for solving fake or vicious news spread problems on social media; the complete design specifications are beyond scope of the current work and will be addressed in the future.


2021 ◽  
Vol 21 (1) ◽  
pp. 28-39
Author(s):  
Susan Long

Damage, physically and to the psyche is inevitable. This is whether it is caused unconsciously, through consciously malicious intent, thoughtlessness, as collateral or just through a hostile environment or the warring of internal forces. At the group or social level, the last few years have seen much damage in terms of economic recession, climate change, racial inequalities, and domestic violence. The desire to repair follows such damage. The psychoanalytic focus on reparation sees the process as an attempt by a person to repair perceived damage to another or, more precisely, to an internal image of the other—a loved other. Large groups such as organisations and societies also do damage and sometimes acknowledge this and make attempts to repair—perhaps defensively, simply to restore their own reputation, but perhaps from guilt and remorse. This article will invite readers to think about reparation in terms of either fantasied wishfulness, or defensiveness, or its possible restorative capacity. My exploration rests on the premise that damage is always to the system and that both that which damages and that which is damaged suffer. It is in system restoration that hope re-emerges.


Author(s):  
Piyush Kumar Shukla ◽  
Kirti Raj Bhatele

Wireless Networks are vulnerable in nature, mainly due to the behavior of node communicating through it. As a result, attacks with malicious intent have been and will be devised to exploit these vulnerabilities and to cripple MANET operation. In this chapter, we analyze the security problems in MANET. On the prevention side, various key and trust management schemes have been developed to prevent external attacks from outsiders. Both prevention and detection method will work together to address the security concern in MANET.


Author(s):  
Sheri Young

This chapter uses a case study, and supporting literature, to explore the function of Psychological Essentialism (the process of giving meaning to perceived “sameness”) in explaining tensions that often arise as we struggle to improve our understanding of diversity and inclusion in higher education, as well as in other social settings. The case study presented throughout the chapter was constructed as an amalgamation of experiences diverse faculty typically report while working on campuses struggling with recruiting and retaining diverse groups. It provides examples of experiences that occur on a range from malicious intent to those that occur, seemingly, without consciousness. The larger question is whether religious and social institutions approach essentialism and stereotyping differently, when it occurs. Seemingly, they do not. The conclusion of this chapter offers solutions for dealing with the barriers faced when attempting to create campus climates that are nurturing and supportive rather than hostile and exclusionary.


Author(s):  
Loo Seng Neo

The growing pervasiveness of the internet and the rise of social media have revolutionised how individuals communicate and interact with one another. Serving as an effective conduit for communication, these technological advancements have also been exploited by individuals with malicious intent (e.g., criminals, violent extremists). As the world witnesses an upward trend of such crime and security concerns in the online sphere, it places the ‘responsibility' on intelligence and law enforcement agencies to respond with the appropriate technological interventions. Thus, this article will discuss how digital footprints can be leveraged to identify potential security threats, particularly for crime and security issues that will result in negative repercussion at the national level, such as acts of violent extremism and hate crimes.


Author(s):  
Deapesh Misra

The Internet has established firm deep roots in our day to day life. It has brought many revolutionary changes in the way we do things. One important consequence has been the way it has replaced human to human contact. This has also presented us with a new issue which is the requirement for differentiating between real humans and automated programs on the Internet. Such automated programs are usually written with a malicious intent. CAPTCHAs play an important role in solving this problem by presenting users with tests which only humans can solve. This chapter looks into the need, the history, and the different kinds of CAPTCHAs that researchers have come up with to deal with the security implications of automated bots pretending to be humans. Various schemes are compared and contrasted with each other, the impact of CAPTCHAs on Internet users is discussed, and to conclude, the various possible attacks are discussed. The author hopes that the chapter will not only introduce this interesting field to the reader in its entirety, but also simulate thought on new schemes.


2011 ◽  
Vol 18 (2) ◽  
pp. 173-199 ◽  
Author(s):  
Atar Livneh

AbstractLeviticus 19:17-18 has long been noted as possessing a significant role within the book of Jubilees. This paper examines the references to these verses, both explicit and via phrases alluding to the ordinance. Two specific aspects of the law are alluded to in Jubilees: “You shall not hate your kinsfolk in your heart” (Lev 19:17a) and “Love your fellow as yourself” (Lev 19:18b). The author of Jubilees understands the first as relating to peaceful coexistence, the second to malicious intent, specifically the intent to murder. This exegesis is consistent throughout Jubilees, as attested by the usage of fixed terms and idioms depicting the observance/violation of the law across various literary units.


Author(s):  
Karīna Kairiša ◽  
Aija Jermacāne

The 21st century is called the technological era where information storage takes place on the website. Due to the diversity there is an interest about the acquisition and use of confidential information in malicious intent. Offences in cyberspace are new in modern society and their discovery and observation is independent research question. Illegal access to automated data processing systems is creation of financial loss and persons legitimate interests violation with the material injury. In article are analyzed signs Latvian Criminal law of the article 241st, 243rd and the criteria for the qualification of the criminal offence of composition


Sign in / Sign up

Export Citation Format

Share Document