Search results

1 – 10 of 114
Open Access
Book part
Publication date: 4 June 2021

Briony Anderson and Mark A. Wood

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious…

Abstract

This chapter examines the phenomenon of doxxing: the practice of publishing private, proprietary, or personally identifying information on the internet, usually with malicious intent. Undertaking a scoping review of research into doxxing, we develop a typology of this form of technology-facilitated violence (TFV) that expands understandings of doxxing, its forms and its harms, beyond a taciturn discussion of privacy and harassment online. Building on David M. Douglas's typology of doxxing, our typology considers two key dimensions of doxxing: the form of loss experienced by the victim and the perpetrator's motivation(s) for undertaking this form of TFV. Through examining the extant literature on doxxing, we identify seven mutually non-exclusive motivations for this form of TFV: extortion, silencing, retribution, controlling, reputation-building, unintentional, and doxxing in the public interest. We conclude by identifying future areas for interdisciplinary research into doxxing that brings criminology into conversation with the insights of media-focused disciplines.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 18 July 2022

Devrim Murat Yazan, Guido van Capelleveen and Luca Fraccascia

The sustainable transition towards the circular economy requires the effective use of artificial intelligence (AI) and information technology (IT) techniques. As the…

Abstract

The sustainable transition towards the circular economy requires the effective use of artificial intelligence (AI) and information technology (IT) techniques. As the sustainability targets for 2030–2050 increasingly become a tougher challenge, society, company managers and policymakers require more support from AI and IT in general. How can the AI-based and IT-based smart decision-support tools help implementation of circular economy principles from micro to macro scales?

This chapter provides a conceptual framework about the current status and future development of smart decision-support tools for facilitating the circular transition of smart industry, focussing on the implementation of the industrial symbiosis (IS) practice. IS, which is aimed at replacing production inputs of one company with wastes generated by a different company, is considered as a promising strategy towards closing the material, energy and waste loops. Based on the principles of a circular economy, the utility of such practices to close resource loops is analyzed from a functional and operational perspective. For each life cycle phase of IS businesses – e.g., opportunity identification for symbiotic business, assessment of the symbiotic business and sustainable operations of the business – the role played by decision-support tools is described and embedding smartness in these tools is discussed.

Based on the review of available tools and theoretical contributions in the field of IS, the characteristics, functionalities and utilities of smart decision-support tools are discussed within a circular economy transition framework. Tools based on recommender algorithms, machine learning techniques, multi-agent systems and life cycle analysis are critically assessed. Potential improvements are suggested for the resilience and sustainability of a smart circular transition.

Details

Smart Industry – Better Management
Type: Book
ISBN: 978-1-80117-715-3

Keywords

Open Access
Book part
Publication date: 18 July 2022

Christian Versloot, Maria Iacob and Klaas Sikkel

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed…

Abstract

Utility strikes have spawned companies specializing in providing a priori analyses of the underground. Geophysical techniques such as Ground Penetrating Radar (GPR) are harnessed for this purpose. However, analyzing GPR data is labour-intensive and repetitive. It may therefore be worthwhile to amplify this process by means of Machine Learning (ML). In this work, harnessing the ADR design science methodology, an Intelligence Amplification (IA) system is designed that uses ML for decision-making with respect to utility material type. It is driven by three novel classes of Convolutional Neural Networks (CNNs) trained for this purpose, which yield accuracies of 81.5% with outliers of 86%. The tool is grounded in the available literature on IA, ML and GPR and is embedded into a generic analysis process. Early validation activities confirm its business value.

Abstract

Details

Appearance as Capital
Type: Book
ISBN: 978-1-80043-711-1

Open Access
Book part
Publication date: 1 May 2019

Roine Leiringer, Xiaoyu Mo and Yan Fang

The paper aims to investigate the emergence the Hong Kong Building Environmental Assessment Methods (HK BEAM) certification scheme and starts to explore the impact of BEAMs on the…

Abstract

Purpose

The paper aims to investigate the emergence the Hong Kong Building Environmental Assessment Methods (HK BEAM) certification scheme and starts to explore the impact of BEAMs on the building industry and the potential emergence and stabilisation of a green building field.

Design/Methodology/Approach

The research presented draws upon content analysis of all 19 versions of the HK BEAM scheme(s) as well as 94 policy reports. This is complemented by an investigation and collation of the participating companies in 100 HK BEAM certified projects. The theoretical framework of Strategic Action Fields is applied to explore the emergence of a potential green building field.

Findings

The findings are tentative, but they point out that a green building field is yet to emerge in Hong Kong.

Research Limitations/Implications

The research is still ongoing and parts of the analysis are yet to be finalised. Therefore, only tentative conclusions are drawn.

Practical implications:

From a practical perspective, the findings point towards a correlation between the memberships in the working committees charged with deciding on the content of the BEAMs and their content.

Originality/Value

So far, very little is known about how exactly BEAMs have come into being. Furthermore, their impact on working practices outside of “certified” projects has received little research attention. This research project is an attempt to rectify this.

Details

10th Nordic Conference on Construction Economics and Organization
Type: Book
ISBN: 978-1-83867-051-1

Keywords

Open Access
Book part
Publication date: 4 May 2018

Khusrizal, Basyaruddin, R.D.H. Rambe and I. Setiawan

Purpose – The research was carried out in order to study the composition of minerals, content of total-K, total-Ca, total-Mg, and exchangeable of K, Ca, Mg in volcanish ash from…

Abstract

Purpose – The research was carried out in order to study the composition of minerals, content of total-K, total-Ca, total-Mg, and exchangeable of K, Ca, Mg in volcanish ash from Sinabung volcano eruption.

Design/Methodology/Approach – The volcanic ash material in amount of 5 kg was collected from the depth of 0–20 cm and 21–41 cm. Mineral composition was determined by using line counting method; total contents of K, Ca, and Mg were measured by HCl 1N extraction, and exchangeable of K, Ca, and Mg was measured by NH4OAc 1N pH 7.0 extraction.

Purpose – The results depicted in volcanic ash layer at the depth of 0–20 cm found some minerals such as plagioclase (34%), hypersthene (9%), augite (3%), hornblende/amphibole (5%), and volcanic glass (1%). These minerals were also found in different amounts at a depth of 21–41 cm. Hypersthene and amphibole were higher and augite was lower at a depth of 0–20 cm than 21–41 cm. The total content of K, Ca, and Mg was found to be 2.27%, 8.12%, and 2.28%, respectively, at a depth of 0–20 cm. The exchangeable of K, Ca, and Mg was found in an amount of 1.89 me/100 g, 20.71 me/100 g, and 1.62 me/100 g, respectively. The total content of K, Ca, and Mg was not available to plants but could potentially be as a source of plant nutrient after weathering while exchangeable form can be uptaken by plant directly.

Research Limitations/Implications – Based on the composition of the minerals, total, and exchangeable of K, Ca, and Mg that the material of volcanic ash, it could potentially be used as source of fertilizers.

Originality/Value – The composition of primary minerals contained in volcanic ash and to know the amount of elements K, Ca, and Mg-associated minerals either in total or exchange.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Open Access
Book part
Publication date: 4 May 2018

Nurasih Shamadiyah, Riyandhi Praza and Martina

Purpose – The purpose of this research is to identify Tuah Teng fishing techniques in food security to facing ASEAN economic community (AEC) and to give description about Tuah…

Abstract

Purpose – The purpose of this research is to identify Tuah Teng fishing techniques in food security to facing ASEAN economic community (AEC) and to give description about Tuah Teng fishing techniques and its relationship with food security of coastal society in face of AEC era.

Design/Methodology/Approach – The method of sampling is by snowball technique, because every generation of fisherman community has used this since a long time ago. The method of analysis is done by descriptive qualitative based on primary data by observation and secondary data from the literature study.

Findings – The technique of fishing Tuah Teng is done by attracting the fish relying on simple equipment consisting of stereofoam, plastic cans, vats with cement and rubber wheel, and fish bait from dried coconut leaves tied to the rope. Availability of fish can support the food security. During season, the prices of fish can be very cheap or even just distributed free to the community.

Research Limitations/Implications – Food security in the era of ASEAN economic community encourages food self-sufficiency and ultimately realizes food sovereignty. The community no longer imports the fish, even they can export because the needs of fish in domestic has been fulfilled.

Practical Implications – The Office of Marine and Fisheries (DKP) has provided assistance in the form of radar and a more modern computer to be able to detect the fish. But fishermen still survive with this traditional method.

Originality/Value – This research identifies Tuah Teng as a traditional of fishing technique in Aceh Utara.

Details

Proceedings of MICoMS 2017
Type: Book
ISBN:

Keywords

Open Access
Book part
Publication date: 9 May 2023

Volker Stocker, William Lehr and Georgios Smaragdakis

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that…

Abstract

The COVID-19 pandemic has disrupted the ‘real’ world and substantially impacted the virtual world and thus the Internet ecosystem. It has caused a significant exogenous shock that offers a wealth of natural experiments and produced new data about broadband, clouds, and the Internet in times of crisis. In this chapter, we characterise and evaluate the evolving impact of the global COVID-19 crisis on traffic patterns and loads and the impact of those on Internet performance from multiple perspectives. While we place a particular focus on deriving insights into how we can better respond to crises and better plan for the post-COVID-19 ‘new normal’, we analyse the impact on and the responses by different actors of the Internet ecosystem across different jurisdictions. With a focus on the USA and Europe, we examine the responses of both public and private actors, with the latter including content and cloud providers, content delivery networks, and Internet service providers (ISPs). This chapter makes two contributions: first, we derive lessons learned for a future post-COVID-19 world to inform non-networking spheres and policy-making; second, the insights gained assist the networking community in better planning for the future.

Details

Beyond the Pandemic? Exploring the Impact of COVID-19 on Telecommunications and the Internet
Type: Book
ISBN: 978-1-80262-050-4

Keywords

Open Access
Book part
Publication date: 4 June 2021

Nicola Henry and Alice Witt

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we…

Abstract

The nonconsensual taking or sharing of nude or sexual images, also known as “image-based sexual abuse,” is a major social and legal problem in the digital age. In this chapter, we examine the problem of image-based sexual abuse in the context of digital platform governance. Specifically, we focus on two key governance issues: first, the governance of platforms, including the regulatory frameworks that apply to technology companies; and second, the governance by platforms, focusing on their policies, tools, and practices for responding to image-based sexual abuse. After analyzing the policies and practices of a range of digital platforms, we identify four overarching shortcomings: (1) inconsistent, reductionist, and ambiguous language; (2) a stark gap between the policy and practice of content regulation, including transparency deficits; (3) imperfect technology for detecting abuse; and (4) the responsibilization of users to report and prevent abuse. Drawing on a model of corporate social responsibility (CSR), we argue that until platforms better address these problems, they risk failing victim-survivors of image-based sexual abuse and are implicated in the perpetration of such abuse. We conclude by calling for reasonable and proportionate state-based regulation that can help to better align governance by platforms with CSR-initiatives.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Open Access
Book part
Publication date: 4 June 2021

Kristen Thomasen and Suzie Dunn

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse…

Abstract

Perpetrators of technology-facilitated gender-based violence are taking advantage of increasingly automated and sophisticated privacy-invasive tools to carry out their abuse. Whether this be monitoring movements through stalkerware, using drones to nonconsensually film or harass, or manipulating and distributing intimate images online such as deepfakes and creepshots, invasions of privacy have become a significant form of gender-based violence. Accordingly, our normative and legal concepts of privacy must evolve to counter the harms arising from this misuse of new technology. Canada's Supreme Court recently addressed technology-facilitated violations of privacy in the context of voyeurism in R v Jarvis (2019) . The discussion of privacy in this decision appears to be a good first step toward a more equitable conceptualization of privacy protection. Building on existing privacy theories, this chapter examines what the reasoning in Jarvis might mean for “reasonable expectations of privacy” in other areas of law, and how this concept might be interpreted in response to gender-based technology-facilitated violence. The authors argue the courts in Canada and elsewhere must take the analysis in Jarvis further to fully realize a notion of privacy that protects the autonomy, dignity, and liberty of all.

Details

The Emerald International Handbook of Technology-Facilitated Violence and Abuse
Type: Book
ISBN: 978-1-83982-849-2

Keywords

Access

Only Open Access

Year

Content type

Book part (114)
1 – 10 of 114