Skip to main content

Home/ CULF 3331: "Middle Eastern Revolutions"/ Group items tagged internet

Rss Feed Group items tagged

ccfuentez

Types of human trafficking / Trafficking in human beings / Crime areas / Internet / Hom... - 0 views

  • There are many forms of trafficking, but one consistent aspect is the abuse of the inherent vulnerability of the victims.
  •  
    There are many different types of human trafficking, but the one thing the different types all have in common is the vulnerability of the victims. The reason and types of different human trafficking include trafficking for forced labor, sexual exploitation, commercial sexual exploitation of children in tourism, trafficking for tissue, cells, and organs, and others.
csherro2

My Arab Spring: Egypt's silent protest - 0 views

  •  
    In June 2010, Khaled Said, a young Egyptian citizen of Alexandria, was beaten to death by plain-clothes police officers outside a local internet cafe. At the time, the Ministry of Interior said he died of asphyxiation caused by swallowing a bag of narcotics, but a picture of Said's battered face began circulating online.
aacosta8

Cyber jihad and cyber terrorism: A real threat to governments - 0 views

  •  
    One of the ways terrorism is flourishing is through the use of information and communication technologies (ICTs) in an online world where 196 countries are connected to the Internet. It should not be surprising that terrorists use ICT, because firstly it is difficult to track and trace cyber communications, and secondly there is a lack of a globally accepted legal framework that would improve information security.
aacosta8

Egypt's cyber crime bill - 0 views

  •  
    Last week, privately owned newspaper Al-Watan reported that the " Revolutionary Punishment " movement posted a warning on its website urging Egyptian judges to forgo their involvement in cases against Brotherhood members or leaders to save themselves and their families. The bill would give judges, for the first time, "the power to deliver deterring sentences for internet crimes such as cyberterrorism.
mportie

Cyber Security Trends To Watch: 2016 - 0 views

  •  
    Major Nation-States are developing new policy and protocol for contingent cyber activities. For Iran having the new nuclear deal put through, it allows Iran to re-enter the global economy, this places focus on their ability to compete, and their cyber-espionage will shift focus towards financial institutions of the world. The bottom line is all States and businesses are transitioning to a more cyber-conscious world where the internet is a prime target of infrastructure.
aacosta8

How terrorists are using social media - 0 views

  •  
    Isis has proved fluent in YouTube, Twitter, Instagram, Tumblr, internet memes and other social media. Its posting activity has ramped up during a recent offensive, reaching an all-time high of almost 40,000 tweets in one day as they marched into the northern Iraqi city of Mosul.
aacosta8

Hezbollah still spreads terror messages on US social media, despite legislation - 0 views

  •  
    Hezbollah and its Al-Manar media outlet continue activity on US social media websites and even use a Miami-based Internet Service Provider despite legislation meant to stop it, Steven Stalinsky, the executive director of MEMRI
‹ Previous 21 - 27 of 27
Showing 20 items per page