Radicalization to Violence: A View from Cultural Psychiatry

2021 ◽  
pp. 136346152110480
Author(s):  
Cécile Rousseau ◽  
Neil K. Aggarwal ◽  
Laurence J. Kirmayer

This article introduces a thematic issue of Transcultural Psychiatry with selected papers from the McGill Advanced Study Institute in Cultural Psychiatry on “Pluralism and Polarization: Cultural Contexts and Dynamics of Radicalization,” which took place June 20–22, 2017. The ASI brought together an interdisciplinary group scholars to consider the role of social dynamics, cultural contexts and psychopathology in radicalization to violent extremism. Papers addressed four broad topics: (1) current meanings and uses of the term radicalization; (2) personal and social determinants of violent radicalization, including individual psychology, interpersonal dynamics, and wider social-historical, community and network processes; (3) social and cultural contexts and trajectories of radicalization including the impact of structural and historical forces associated with colonization and globalization as well as contemporary political, economic and security issues faced by youth and disaffected groups; and (4) approaches to community prevention and clinical intervention to reduce the risk of violent radicalization. In this introductory essay, we revisit these themes, define key terms, and outline some of the theoretical and empirical insights in the contributions to this issue. Efforts to prevent violent radicalization face challenges because social media and the Internet allow the rapid spread of polarizing images and ideas. The escalation of security measures and policies also serves to confirm the worldview of conspiracy theory adherents. In addition to addressing the structural inequities that fuel feelings of anger and resentment, we need to promote solidarity among diverse communities by building a pluralistic civil society that offers a meaningful alternative to the violent rhetorics of us and them.

Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


2022 ◽  
pp. 191-213
Author(s):  
Heru Susanto ◽  
Leu Fang Yie ◽  
Didi Rosiyadi ◽  
Akbari Indra Basuki ◽  
Desi Setiana

Digital ecosystems have grown rapidly over the years, and governments are investing in digital provision for their processes and services. Despite the advantages of distributed technologies, there are many security issues as well that result in breaches of data privacy with serious impact including legal and reputational implications. To deal with such threats, government agencies need to thoughtfully improve their security defences to protect data and systems by using automation and artificial intelligence (AI), as well as easing the data security measures including early warning of threats and detection. This study provides a comprehensive view of AI and automaton to highlight challenges and issues concerning data security and suggests steps to combat the issues. The authors demonstrate the role of AI-driven security tools and automation to mitigate the impact of data breaches to also propose recommendations for government agencies to enhance their data security protection.


Author(s):  
Michael Warah Nsoh ◽  
Kathleen Hargiss ◽  
Caroline Howard

The article describes research conducted to assess and address some key security issues surrounding the use of information technology from employee behavioral standpoint. The aim of the study was to determine additional security measures to reduce security incidents and maximize effective use of information systems. The research is an extension of several recent empirical studies in information systems security policy behavioral compliance, which have generally found people to be a weak link in information security. A mix of theoretical frameworks resulted in a model based on the Theory of Planned Behavior (TPB), which was used to test the impact that management and employee relationship has on deterrence. Results indicate that management has a significant stake in influencing the behavior of their employees, and that the issue of employee disgruntlement nevertheless is not paramount of top management's Information systems security challenges.


2014 ◽  
Vol 55 (1-2) ◽  
pp. 131-144
Author(s):  
Suzanne Marie Francis

By the time of his death in 1827, the image of Beethoven as we recognise him today was firmly fixed in the minds of his contemporaries, and the career of Liszt was beginning to flower into that of the virtuosic performer he would be recognised as by the end of the 1830s. By analysing the seminal artwork Liszt at the Piano of 1840 by Josef Danhauser, we can see how a seemingly unremarkable head-and-shoulders bust of Beethoven in fact holds the key to unlocking the layers of commentary on both Liszt and Beethoven beneath the surface of the image. Taking the analysis by Alessandra Comini as a starting point, this paper will look deeper into the subtle connections discernible between the protagonists of the picture. These reveal how the collective identities of the artist and his painted assembly contribute directly to Beethoven’s already iconic status within music history around 1840 and reflect the reception of Liszt at this time. Set against the background of Romanticism predominant in the social and cultural contexts of the mid 1800s, it becomes apparent that it is no longer enough to look at a picture of a composer or performer in isolation to understand its impact on the construction of an overall identity. Each image must be viewed in relation to those that preceded and came after it to gain the maximum benefit from what it can tell us.


2020 ◽  
Author(s):  
Cátia Santos-Pereira

BACKGROUND GDPR was scheduled to be formally adopted in 2016 with EU member states being given two years to implement it (May 2018). Given the sensitive nature of the personal data that healthcare organization process on a 24/7 basis, it is critical that the protection of that data in a hospital environment is given the high priority that data protection legislation (GDPR) requires. OBJECTIVE This study addresses the state of Public Portuguese hospitals regarding GDPR compliance in the moment of GDPR preparation period (2016-2018) before the enforcement in 25 May 2018, and what activities have started since then. The study focuses in three GDPR articles namely 5, 25 and 32, concerning authentication security, identity management processes and audit trail themes. METHODS The study was conducted between 2017 and 2019 in five Portuguese Public Hospitals (each different in complexity). In each hospital, six categories of information systems critical to health institutions were included in the study, trying to cover the main health information systems available and common to hospitals (ADT, EPR, PMS, RIS, LIS and DSS). It was conducted interviews in two phases (before and after GDPR enforcement) with the objective to identify the maturity of information systems of each hospital regarding authentication security, identity management processes and traceability and efforts in progress to avoid security issues. RESULTS A total of 5 hospitals were included in this study and the results of this study highlight the hospitals privacy maturity, in general, the hospitals studied where very far from complying with the security measures selected (before May 2018). Session account lock and password history policy were the poorest issues, and, on the other hand, store encrypted passwords was the best issue. With the enforcement of GDPR these hospitals started a set of initiatives to fill this gap, this is made specifically for means of making the whole process as transparent and trustworthy as possible and trying to avoid the huge fines. CONCLUSIONS We are still very far from having GDPR compliant systems and Institutions efforts are being done. The first step to align an organization with GDPR should be an initial audit of all system. This work collaborates with the initial security audit of the hospitals that belong to this study.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Lars Lind ◽  
Johan Sundström ◽  
Johan Ärnlöv ◽  
Ulf Risérus ◽  
Erik Lampa

AbstractThe impact of most, but not all, cardiovascular risk factors decline by age. We investigated how the metabolic syndrome (MetS) was related to cardiovascular disease (CVD) during 40 years follow-up in the Uppsala Longitudinal Study of Adult Men (ULSAM, 2,123 men all aged 50 at baseline with reinvestigations at age 60, 70, 77 and 82). The strength of MetS as a risk factor of incident combined end-point of three outcomes (CVD) declined with ageing, as well as for myocardial infarction, ischemic stroke and heart failure when analysed separately. For CVD, the risk ratio declined from 2.77 (95% CI 1.90–4.05) at age 50 to 1.30 (95% CI 1.05–1.60) at age 82. In conclusion, the strength of MetS as a risk factor of incident CVD declined with age. Since MetS was significantly related to incident CVD also at old age, our findings suggest that the occurrence of MetS in the elderly should not be regarded as innocent. However, since our data were derived in an observational study, any impact of MetS in the elderly needs to be verified in a randomized clinical intervention trial.


2016 ◽  
Vol 43 (2) ◽  
pp. 273-315 ◽  
Author(s):  
Ray Friedman ◽  
Ying-Yi Hong ◽  
Tony Simons ◽  
Shu-Cheng (Steve) Chi ◽  
Se-Hyung (David) Oh ◽  
...  

Behavioral integrity (BI)—a perception that a person acts in ways that are consistent with their words—has been shown to have an impact on many areas of work life. However, there have been few studies of BI in Eastern cultural contexts. Differences in communication style and the nature of hierarchical relationships suggest that spoken commitments are interpreted differently in the East and the West. We performed three scenario-based experiments that look at response to word–deed inconsistency in different cultures. The experiments show that Indians, Koreans, and Taiwanese do not as readily revise BI downward following a broken promise as do Americans (Study 1), that the U.S.–Indian difference is especially pronounced when the speaker is a boss rather than a subordinate (Study 2), and that people exposed to both cultures adjust perceptions of BI based on the cultural context of where the speaking occurs (Study 3).


Author(s):  
Garrett D. Brown

Women make up the large majority of workers in global supply chains, especially factories in the apparel supply chain. These workers face significant inequalities in wages, workplace hazards, and a special burden of gender-based violence and harassment. These “normal” conditions have been compounded by the impact of the COVID-19 pandemic, which has exacerbated long-standing structural inequities. Decades of well-financed “corporate social responsibility” programs have failed because they do not address the underlying causes of illegal and abusive working conditions. New initiatives in the past half-decade offer promise in putting the needs and rights of workers front and center. Occupational health and safety professionals can assist in the global effort to improve working and social conditions, and respect for the rights and dignity of women workers, through advocacy and action on the job, in their professional associations, and in society at large.


Author(s):  
Yernar Zh Akimbayev ◽  
Zhumabek Kh Akhmetov ◽  
Murat S Kuanyshbaev ◽  
Arman T Abdykalykov ◽  
Rashid V Ibrayev

Studying the historical facts of past wars and armed conflicts and natural and man-made emergencies, today in the Republic of Kazakhstan one of the most important security issues is the preparation and organization of the evacuation of the population from possible dangerous zones, taking into account the emergence of new threats to the country’s security. The paper presents an algorithm for constructing universal scales of the distribution function of opportunities by types of support and rebuilding them into subject scales using display functions. The purpose of the paper is to determine the integral indicators characterizing the possibility of accommodation of the evacuated population and the impact on resources during relocation. On the subject scales of cities and districts of the region, indicators of the possibility of relocation of a certain amount of the evacuated population by types of support and indicators characterizing the impact on the district’s resources during resettlement of a certain amount of the evacuated population are determined. It was concluded that the use of integrated indicators allows the selection of areas to accommodate the evacuated population without the use of statistical data, in conditions of incomplete and inaccurate information. The presented method does not replace traditional methods based on classical methods of territory assessment by the level of life sustenance, but also allows their reasonable combination with the experience of specialists in this field, taking into account the incompleteness, uncertainty, and inconsistency of the initial data of the study area, which does not allow the application of existing methods.


Author(s):  
Leso Munala ◽  
Emily Welle ◽  
Nene Okunna ◽  
Emily Hohenshell

Sexual violence is one of the most common forms of violence against women in Kenya. This study documents the care of sexual violence survivors from the perspective of health care practitioners based on an analytic framework developed in studies of the political-economy of health to examine the effects of International Financial Institutions’ conditionalities on the allocation of national fiscal resources. The study documented the working conditions of practitioners and myriad challenges that they experience in providing quality services to sexual violence survivors. The issues reflected in the results are grounded in social structural inequities driven by the global political economic policies that perpetuate poverty and dependency throughout Africa and the developing world. Macro-level variables associated with health care provision are assessed with a focus on global macroeconomic policies established by the International Monetary Fund and World Bank, their impact on Kenya’s health economy and their ultimate impact on the capacity of the health system to meet the complex needs of survivors of sexual violence. In this paper, study results are analysed within the context of these macroeconomic policies and their legacy.


Sign in / Sign up

Export Citation Format

Share Document