2020
DOI: 10.7146/torture.v30i1.120593
|View full text |Cite
|
Sign up to set email alerts
|

Internet and communications as elements for CIDT and Torture. Initial reflections in an unexplored field

Abstract: The internet was once seen as a new and definitive window to freedom and a world without torture. There is however, another less obvious but perhaps more notorious side: torturous environments can also be created through the internet; a place where individu- als may be targeted for discrimination, coer- cion or control.There is a dearth of academic research and theoretical developments in this very new area of knowledge and this Edito- rial will review and reflect on various aspects… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…The perspectives from medical and psychological practices have more evidential values, however, reliability and construct validity are post facto and the research sought a predictive approach to the adverse mass psychological impacts. With the uncertainties in the psychopaths' models, algorithms, and etc., thirteen elements were listed in 1) Unauthorised access (tapping) and monitoring access; 2) Control and manipulation of personal information; 3) Spoofing and Identity Theft; 4) Monitoring and Cyberstalking; 5) Discriminatory statements; 6) Harassment; 7) Threats; 8) Dissemination of personal or intimate information without consent; 9) Blackmail; 10) Discrediting; 11) Technology-related sexual abuse and exploitation; 12) Attacks to channels of expression; 13) Omissions by actors with regulatory power, and the less researched are remotely-controllable health attacks such as rapidly changing a person's computer screen brightness during myocarditis symptoms with surveillance methods, whereas if sudden deaths can be accelerated from existing symptoms, the assassinations are hardly noticeable or if noticed, traceable, by traditional autopsy methods [42,43].…”
Section: Data Analytic Strategiesmentioning
confidence: 99%
“…The perspectives from medical and psychological practices have more evidential values, however, reliability and construct validity are post facto and the research sought a predictive approach to the adverse mass psychological impacts. With the uncertainties in the psychopaths' models, algorithms, and etc., thirteen elements were listed in 1) Unauthorised access (tapping) and monitoring access; 2) Control and manipulation of personal information; 3) Spoofing and Identity Theft; 4) Monitoring and Cyberstalking; 5) Discriminatory statements; 6) Harassment; 7) Threats; 8) Dissemination of personal or intimate information without consent; 9) Blackmail; 10) Discrediting; 11) Technology-related sexual abuse and exploitation; 12) Attacks to channels of expression; 13) Omissions by actors with regulatory power, and the less researched are remotely-controllable health attacks such as rapidly changing a person's computer screen brightness during myocarditis symptoms with surveillance methods, whereas if sudden deaths can be accelerated from existing symptoms, the assassinations are hardly noticeable or if noticed, traceable, by traditional autopsy methods [42,43].…”
Section: Data Analytic Strategiesmentioning
confidence: 99%