Papers by Md Ishtiak Hossain

This paper examines the central role that Generation Z has played in generating mass eruptions, a... more This paper examines the central role that Generation Z has played in generating mass eruptions, across the developing world, showcasing some of the characteristics and mobilization strategies of the group that have so profoundly deflected and disrupted their political systems and government. Drawings on key case studies, from Bangladesh to Nepal, Kenya to Myanmar and Indonesia, the study looks at how Gen Z's digital nativity, intersectional values and decentralized activism have redefined protest culture and challenged long-standing power dynamics. It goes into depth about the conditions of the rise of youth-led movements, and compares the strategies of Gen Z to the Millennials, and examines importantly the imaginative blend of online and offline methods used to maintain a mass movement. The paper also discusses the challenges these movements are facing, including repressions by states, digital divides and misinformation, while assessing the potential for lasting political and social movements. This research ultimately reinforces Generation Z as a powerful adaptable force changing the face of democracy and governance in the developing world and signals a need for greater engagement, and partisan support, from policymakers and civil society organizations to help achieve their transformative potential.

And as we enter 2025, cybercrime has become a global economic pandemic, with projected damages wo... more And as we enter 2025, cybercrime has become a global economic pandemic, with projected damages worldwide to cost the globe a record $10.5 trillion annually, making cybercrime the world's third largest economy after the United States and China. The paper examines drivers propelling attack volumes to stratospheric levels, as well as hyper-advanced ransom ware challenges, state-sponsored cyber-attacks, and the rise of AI-powered phishing as potential existential threats to both economic stability and international order. Businesses and governments alike risk deepening losses from $4.88 million per data breach to sector-shattering brand and productivity damage as well as spiking cyber insurance costs and global regulatory crackdown. By sharing new case studies and findings from our own research, this study also considers how AI is extending the range of and the realism of attacks but also how defenders are just beginning to adapt, from adopting new architectures like Zero Trust, to the formation of global cyber policy coalitions. By shining light on both new attack vectors and old defenses, this research aspires to offer practitioners and policymakers practical ideas for how to weather and thrive in a digital age of "warfare without borders" and unending economic unpredictability.

The increasing popularity and improvement of social media have brought us a lot of benefits, incl... more The increasing popularity and improvement of social media have brought us a lot of benefits, including a convenience relationship and a more responsive mass media. But along with this metamorphosis there has been a proliferation of cyber security threats that have increased both in size and complexity. From phishing and malware to identity theft and disinformation, social media sites such as Facebook, Instagram, Twitter and TikTok are perfect platforms for a range of cyber threats. AI Cyber criminals have already started using various AI (artificial intelligence) tools to launch targeted attacks, which include AI-powered phishing, deep fakes and social engineering. This everchanging nature of threats has made the role of defense-and-, in an offensive stance, offense-systems more and more critical. This paper examines the forms of cyber threats that are emerging in social media, as well as the new risks that AI and other digital technologies have contributed, and existing means to mitigate cyber risks. It highlights the need for user awareness, multi-factor authentication, and monitoring of accounts for individuals as well as organizations. Moreover, it emphasizes the need for developing integrated, proactive defenses to address the challenge of growing cyber threats in an increasingly social world. Through real-life examples and a look at advances in threat detection, this paper identifies practical ways to address the increasing cyber risk resulting from social media use and achieve safer online interactions.

In this work, the researcher examines the establishment of an algorithmic public actually; the re... more In this work, the researcher examines the establishment of an algorithmic public actually; the researcher is seeking to explore how to digitize journalism, communication and democracy in digital age. Based on the work of Habermas in his theory of the classical public sphere, the study theorizes the new role of digital platforms, which control information transmission process in the digital environment, influencing the development of the discourse and political enrolment. It also draws attention to the key role of algorithmic gatekeeping and tracks the impact of curbed content on news use, journalism, and civic activity. The dual-edged nature of the algorithmic mediation is revealed because the study based on a qualitative research design, which incorporates document analysis and semi-structured interviews with the media professionals, unearths that the algorithmic mediation effects both positively, that is, it improves personalized news delivery, and mobilizes citizen participation and brings forth challenges like polarization, misinformation, and the erosion of editorial autonomy. Informed recovery and critique Informed democratic deliberation (Calhoun 30; 37) can be threatened by ideological fragmentation that develops due to exposure to ideologically curated environments mediated by algorithms (e52). The paper also has a theoretical gain, since it has combined the critiqual perspectives in digital algorithms and the theory of the public sphere to draw a structure on how digital democracy is reconstituted. This research recommends increasing the transparency of algorithms, government regulation, and media literacy in order to reduce biases and encourage inclusive communication. The workable suggestions focus on the need to have sustainable models of journalism and collaboration systems of governance between the policymakers, platforms, and civil society. The limits to the study are access restraints on the data and the geographical scope, and the next stage can be comparative and quantitative studies. This piece makes the case that there is an acute necessity to adjust the algorithmic public sphere to support democratic principles within a contemporary environment ruled by digital mediation.

In this inquiry the authors question the interface between the political corruption, extortion an... more In this inquiry the authors question the interface between the political corruption, extortion and high hopes of the populace after coups in the developing countries. The general aim is to explain how corruption after a coup has influenced citizens to anticipate policy reformation, growth of the economy, and the transparency of the government. In that regard, the case studies of various Asian states are used as well as similar developments in other third world societies. The resultant evidence also highlights the instrumental nature of corruption on facilitating and maintaining coups and the resultant loss of popular trust in government outfits. As a methodological approach, the research is going to be mixedmethodical. A qualitative inquiry, which consists of interviews with common people, political participants, and civically inclined domain experts, is used together with quantitative measurements of focused economic output, corruption product, and surveys of popular opinion prior to regime changes and subsequent to the changes. A combination of these strands brings to the fore greater understanding on how corruption alters government structures and national economic wellbeing in transitional environments. Parallel to this analysis, there is the question on how the effects of extortion and rent seeking processes following staging of coups enhance the challenges to the reconstitution of democratic structures. The empirical evidence indicates that even though a lot of expectations are expected of improved governance policies that come along with regime change it is evident that the availability and persistence of corruption, particularly the extortion of political elite and bureaucratic officials never seem to cease to disappoint such expectations. In many instances, coups have not succeeded in bringing about the expected changes but they have created political instability and stagnant growth of economies. The paper thus ends with a list of anti-corruption measures and governance restructuring that can be taken to dampen the long term harmful repercussions of corruption and strengthen public confidence in interim governments that come to power through coups. Together, the research provides insight into the continuity of corruption and extortion to continue to shape the political buildings of the developing regions following regime changes, and that is a vital piece of advice in providing policymakers and global powerhouse bodies.
Uploads
Papers by Md Ishtiak Hossain