Merriam-Webster to redefine ‘racism’ after request

Agencies
June 10, 2020

US dictionary Merriam-Webster will update the meaning of the word "racism" after being contacted by a Missouri black woman, who claimed the current definition fell short of including the systematic oppression of people of colour, according to media reports.

"A revision to the entry for racism is now being drafted to be added to the dictionary soon, and we are also planning to revise the entries of other words that are related to racism or have racial connotations," according to a statement of the 189-year-old dictionary shared by Kennedy Mitchum, a recent graduate of Drake University in Iowa, on her Facebook.

Mitchum, 22, emailed the dictionary last month, following the death of African American George Floyd in the custody of four Minneapolis police officers, Xinhua news agency reported.

"I kept having to tell them that definition is not representative of what is actually happening in the world," Mitchum told CNN. "The way that racism occurs in real life is not just prejudice, it's the systemic racism that is happening for a lot of black Americans."

Merriam-Webster's first definition of racism is "a belief that race is the primary determinant of human traits and capacities and that racial differences produce an inherent superiority of a particular race."

"It's not just disliking someone because of their race," Mitchum wrote in a Facebook post on Friday. "This current fight we are in is evidence of that, lives are at stake because of the systems of oppression that go hand-in-hand with racism."

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
May 17,2020

As millions of people get hooked to online dating platforms, their proliferation has led to online romance scams becoming a modern form of fraud that have spread in several societies along with the development of social media like Facebook Dating, warn researchers.

For example, extra-marital dating app Gleeden has crossed 10 lakh users in India in COVID-19 times while dating apps like Tinder and Bumble have gained immense popularity.

According to researchers from University of Siena and Scotte University Hospital led by Dr Andrea Pozza, via a fictitious Internet profile, the scammer develops a romantic relationship with the victim for 6-8 months, building a deep emotional bond to extort economic resources in a manipulative dynamic.

"There are two notable features: on the one hand, the double trauma of losing money and a relationship, on the other, the victim's shame upon discovery of the scam, an aspect that might lead to underestimation of the number of cases," the authors wrote in a paper published in the journal Clinical Practice & Epidemiology in Mental Health.

Around 1,400 dating sites/chats have been created over the last decade in North America alone. In the UK, 23 per cent of Internet users have met someone online with whom they had a romantic relationship for a certain period and even 6 per cent of married couples met through the web.

"The online dating industry has given rise to new forms of pathologies and crime, said the authors.

The results showed that 63 per cent of social media users and 3 per cent of the general population reported having been a victim at least once.

Women, middle-aged people, and individuals with higher tendencies to anxiety, romantic idealization of affective relations, impulsiveness and susceptibility to relational addiction are at higher risk of being victims of the scam.

Online romance scams are, in other words, relationships constructed through websites for the purpose of deceiving unsuspecting victims in order to extort money from them.

The scammer always acts empathetically and attempts to create the impression in the victim that the two are perfectly synced in their shared view of life.

"The declarations of the scammer become increasingly affectionate and according to some authors, a declaration of love is made within two weeks from initial contact," the study elaborated.

After this hookup phase, the scammer starts talking about the possibility of actually meeting up, which will be postponed several times due to apparently urgent problems or desperate situations such as accidents, deaths, surgeries or sudden hospitalizations for which the unwitting victim will be manipulated into sending money to cover the momentary emergency.

Using the strategy of "testing-the-water", the scammer asks the victim for small gifts, usually to ensure the continuance of the relationship, such as a webcam, which, if successful, leads to increasingly expensive gifts up to large sums of money.

When the money arrives from the victim, the scammer proposes a new encounter.

The request for money can also be made to cover the travel costs involved in the illusory meeting. In this phase, the victim may start having second thoughts or showing doubt about the intentions of the partner and gradually decide to break off the relationship.

"In other cases, the fraudulent relationship continues or even reinforces itself as the victim, under the influence of ambivalent emotions of ardor and fear of abandonment and deception, denies or rationalizes doubts to manage their feelings," said the study.

In some cases, the scammer may ask the victim to send intimate body photos that will be used as a sort of implicit blackmail to further bind the victim to the scammer.

Once the scam is discovered, the emotional reaction of the victim may go through various phases: feelings of shock, anger or shame, the perception of having been emotionally violated (a kind of emotional rape), loss of trust in people, a sensation of disgust towards oneself or the perpetrator of the crime and a feeling of mourning.

"Understanding the psychological characteristics of victims and scammers will allow at-risk personality profiles to be identified and prevention strategies to be developed," the authors suggested.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 22,2020

New Delhi, Jan 22: "Don't get into a trap. Your security is in your hands," the Border Security Force (BSF) has said issuing its social media rules for its officers and men. It has directed them not to use 42 mobile applications and show caution while using Facebook, Twitter and WhatsApp.

"Be cautious while using social media," said the BSF in a circular issued recently.

"Before using WhatsApp, Facebook, Twitter and other social media platforms, one needs to keep in mind that you are border guarding force and Central Civil Services (Conduct) Rules rule duly are applicable," it said.

It further pointed out that by commenting/writing about or forwarding unverified reports and rumours one violates laws of land.

"Several times unverified reports would be presented in way that they are absolutely true and start believing it. Seeing such post always use your commonsense and never get into the trap (sic.)," it state adding that the anti-national elements uses social media to propagate their agenda to cause unrest in India.

A picture clicked by Border Security Force personnel and posted on a social media platform remains there for always. Therefore, one should use officially approved pictures about any incident or untoward incidents related to Border Security Force, stated the circular. It pointed that unauthorised persons should not engage into taking pictures of the incidents.

It also highlighted how through social media, a few BSF personnel have fallen into trap of espionage racket carried out by enemy countries.

"Our security and respect is in our hands. Always think twice whether you are doing correct by accepting friendship requests from unknown persons, especially women and girls," it cautioned the troopers and officers.

It also highlighted that while going on leave and joining back the force, always follow the rules and regulations laid out for safety and security. "This is for your own safety," it stressed in the end.

The BSF has also issued a list of 42 mobile applications that needs to be completely avoided by serving BSF officers and jawans.

They are MI store, Weibo, Wechat, Shareit, Truecaller, UC News, UC Browser, Beautyplus, NewsDog, Viva Video - QU video Inc, Parallel Space, Apus Browser, Perfect Corp, Virus Cleaner - HI Security Lab, CM browser, MI Community, DU recorder, Vault Hide - No mobile Security, Youcam Makeup, Cachecleaner DU Apps Studio, DU battery saver, DU privacy, 360 security, DU Browser,Clean master - Cheeta Mobile, Baidu Translate, Wonder Camera - Bindu Inc, ES Ifle Explorer, Photo Wonder, QQ international , QQ music, QQ Mail, AA player, QQ News Feed, Wesync, QQ security Center, Selfie City, Mail Master, Mi Video Call -Xaomi and QQ launcher.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
Agencies
January 3,2020

Giving each and every app access to personal information stored on Android smartphones such as your contacts, call history, SMS and photos may put you in trouble as bad actors can easily use these access to spy on you, send spam messages and make calls anywhere at your expense or even sign you up for a premium "service", researchers from cybersecurity firm Kaspersky have warned.

But one can restrict access to such information as Android lets you configure app permissions. 

Giving an app any of these permissions generally means that from now on it can obtain information of this type and upload it to the Cloud without asking your explicit consent for whatever it intends to do with your data.

Therefore, security researchers recommend one should think twice before granting permissions to apps, especially if they are not needed for the app to work. 

For example, most games have no need to access your contacts or camera, messengers do not really need to know your location, and some trendy filter for the camera can probably survive without your call history, Kaspersky said. 

While decision to give permission is yours, the fewer access you hand out, the more intact your data will be.

Here's what you should know to protect your data.

SMS: An app with permission to send and receive SMS, MMS, and WAP (Wireless Application Protocol) push messages, as well as view messages in the smartphone memory will be able to read all of your SMS correspondence, including messages with one-time codes for online banking and confirming transactions.

Using this permission, the app can also send spam messages in your name (and at your expense) to all your friends. Or sign you up for a premium "service." You can see and conrol which apps have these rights by going to the settings of your phone.

Calendar: With permission to view, delete, modify, and add events in the calendar, prying eyes can find out what you have done and what you are doing today and in the future. Spyware loves this permission.

Camera: Permission to access the camera is necessary for the app to take photos and record video. But apps with this permission can take a photo or record a video at any moment and without warning. Attackers armed with embarrassing images and other dirt on you can make life a misery, according to Kaspersky.

Contacts: With permission to read, change, and add contacts in your address book, and access the list of accounts registered in the smartphone, an app can send your entire address book to its server. Even legitimate services have been found to abuse this permission, never mind scammers and spammers, for whom it is a windfall.

This permission also grants access to the list of app accounts on the device, including Google, Facebook, and many other services.

Phone: Giving access to your phone means permission to view and modify call history, obtain your phone number, cellular network data, and the status of outgoing calls, add voicemail, access IP telephony services, view numbers being called with the ability to end the call or redirect it to another number and call any number.

This permission basically lets the app do anything it likes with voice communication. It can find out who you called and when or prevent you from making calls (to a particular number or in general) by constantly terminating calls. 

It can eavesdrop on your conversations or, of course, make calls anywhere at your expense, including to pay-through-the-nose numbers, Kaspersky warned.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.