Search Results

1 - 10 of 13 items :

  • "Human rights" x
  • Computer Sciences x
Clear All
Social Engineering Attacks on Government Opponents: Target Perspectives

://www.mideastmedia.org/survey/2015/ [18] H. Choi, B. B. Zhu, and H. Lee, “Detecting malicious web links and identifying their attack types.” USENIX Conference on Web Application Development 2011, 2011. [Online]. Available: http://research.microsoft.com/apps/pubs/default.aspx?id=193308 [19] S. Afroz and R. Greenstadt, “Phishzoo: Detecting phishing websites by looking at them,” in Fifth IEEE International Conference on Semantic Computing (ICSC) . IEEE, 2011, pp. 368–375. [20] “Reflecting on Ten Years of Practice: The Challenges of Digital Security Training for Human Rights

Open access
Distributed Consistency Method and Two-Phase Locking in Cloud Storage over Multiple Data Centers

Addressable Network. – IEICE Transactions on Information and Systems, Vol. 89 , 2006, No 6, pp. 1923-1930. 11. Barbera, P. Birds of the Same Feather Tweet Together: Bayesian Ideal Point Estimation Using Twitter Data. – Political Analysis, Vol. 23 , 2015, No 1, pp. 76-91. 12. Gao, H. A Case Study on Trade, Technology and Human Rights under the Gats. – Asian Journal of Wto & International Health Law and Policy, Vol. 6 , 2011, No 2, pp. 349-387. 13. Corbett, J. C., J. Dean, M. Epstein. Spanner: Google’s Globally Distributed Database. – ACM Transactions on

Open access
Student Activists or Student Anarchists? South Africa’s Contemporary Student Protests Reviewed

Abstract

Just over twenty-three years ago, the right to strike or protest received an explicit constitutional entrenchment and thus, legal protection. This would progressively empower citizens, including students, to protest against any infringement or deprivation of their rights or entitlements, and poor service delivery by any stakeholder in the institutions of learning, the government or private sector even. Today, South Africa is inundated with multiplicity of nationwide protests, most of which have been accompanied by appalling levels of violence, anarchy and criminality. Unexpectedly, students have had their share in such protests, and it could be argued, they have been an inspiration to various communities. Hence, this article proffers a critical reflection of the conduct of students during protests at the institutions of higher learning. The article seeks to understand and or explain variables that motivate students to vandalise property or antagonise those that opt to be passive or non-participants of such protests. In comparison to variables identified concerning the 1976 student protests, which were ideologically well grounded, the article attempts to describe contemporary students’ thinking towards protests and why vandalism and anarchism have become, not only conventional, but so intensely socialised. The article adopts content analysis method, and employs crowd theory and collective behaviour approach as tools of analysis. It is asserted that lack of ideological strategy underpinning South Africa’s unending revolution, which is needed to inform students’ struggles, is responsible for pervasive tendencies of vandalism and destruction of property during student protests.

Open access
Visualization of Disciplinary Profiles: Enhanced Science Overlay Maps

London School Economics & Political Science) OR (LSE AND London School Economics & Political Science) OR (LSE CTR STUDY HUMAN RIGHTS AND London School Economics & Political Science) OR (LSE DEPT INT RELAT AND London School Economics & Political Science) OR (LSE FINANCIAL MKT GRP AND London School Economics & Political Science) OR (LSE GENDER INST AND London School Economics & Political Science) OR (LSE GLOBAL GOVERNANCE AND London School Economics & Political Science) OR (LSE HLTH AND London School Economics & Political Science) OR (LSE HLTH SOCIAL CARE AND London

Open access
Toward Mending Two Nation-Scale Brokered Identification Systems

(6):644–654, 1976. [14] European Court of Human Rights. European Convention on Human Rights, Entry into force on June 2010. (As amended by Protocols No. 11 and 14; supplemented by Protocols Nos. 1,4,6,7 and 13.) PDF file (30 pages) – echr.coe.int website. SHA256: . [15] Federal Chief Information Officers Council and Federal Enterprise Architecture. Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance – Version 2.0, December 2, 2011. PDF file (478 pages) – idmanagement.gov website. SHA256: . [16] T. K. Frederiksen, T

Open access
ConsenSGX: Scaling Anonymous Communications Networks with Trusted Execution Environments

. https://metrics.torproject.org/ . Accessed September 2018. [71] The Tor Project. Who Uses Tor? https://www.torproject.org/about/torusers.html.en . Accessed September 2018. [72] United Nations. Universal Declaration of Human Rights (Article 12), 1948. http://www.un.org/en/universal-declaration-human-rights/ . Accessed September 2018. [73] C. Wacek, H. Tan, K. S. Bauer, and M. Sherr. An Empirical Evaluation of Relay Selection in Tor. In 20th Network and Distributed System Security Symposium (NDSS) , 2013. [74] D. S. Wallach. A Survey of Peer

Open access
Analyzing the Great Firewall of China Over Space and Time

=cn&events=off. [41] Tokachu. The not-so-great firewall of China. 2600 Magazine, Winter 2006-2007. [42] TorStatus. Tor network status. http://torstatus.blutmagie. de. [43] G. Walton. China’s golden shield : corporations and the development of surveillance technology in the People’s Republic of China. International Centre for Human Rights and Democratic Development, 2001. [44] Y. A. Wang, C. Huang, J. Li, and K. W. Ross. Queen: Estimating packet loss rate between arbitrary internet hosts. In Passive and Active Network Measurement

Open access
Individual versus Organizational Computer Security and Privacy Concerns in Journalism

Times, February 2013. [Online]. Available: http://www.nytimes.com/2013/02/02/technology/washington-posts-joins-list-ofmedia-hacked-by-the-chinese.html?_r=0 [6] -, “Wall Street Journal Announces That It, Too, Was Hacked by the Chinese,” The New York Times, January 2013. [Online]. Available: http://www.nytimes.com/2013/02/01/technology/wall-street-journal-reports-attackby-china-hackers.html?ref=technology [7] Human Rights Watch, “With Liberty to Monitor All: How Large-Scale US Surveillance is Harming Journalism, Law, and American

Open access
A Semantic Retrieval System for Case Law

Administrative Law Theory”, Africa Focus , vol. 14, no. 2, pp. 119–140, 1998. https://doi.org/10.21825/af.v14i2.5549 [21] W. Lacey, “Judicial Discretion and Human Rights: Expanding the Role of International Law in the Domestic Sphere,” Melbourne Journal of International Law, vol. 5, no. 25, 2004. [22] J. Franklin, “Discussion paper: how much of commonsense and legal reasoning is formalizable? A review of conceptual obstacles,” Law, Probability and Risk , vol. 11, no. 2-3, pp. 225–245, 2012. https://doi.org/10.1093/lpr/mgs007 [23] E. P. Ebietomere, and G

Open access
Ubuntu and Capabilities Approach: Basic Doctrines for Calibrating Humanitarian Action

References Buchanan-Smith, M. & Cosgrave, J. (2013). Evaluation of Humanitarian Action: Pilot Guide. The Active Learning Network for Accountability and Performance in Humanitarian Action (ALNAP), London: Overseas Development Institute. Burges, J.P. (2002). Ethics of Humanitarian Intervention: The Circle Closes. Security Dialogue, 33(3), 261-264. Clark, D.A. (2005). Sen’s capability approach and the many spaces of human well-being. The Journal of Development Studies, 41(8), 1339-1368. Darcy, J. (2004). Human Rights and Humanitarian

Open access