The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid proliferation of online social networks has greatly boosted the dissemination and evolution of online memes, which can be free text, trending catchphrase, or micro media. However, this information abundance is exceeding the capability of the public to consume it, especially in unusual situations such as emergency management, intelligence acquisition, and crime analysis. Thus, there calls...
Many threats in the real world can be related to activities in public sources on the internet. Early detection of threats based on internet information could assist in the prevention of incidents. However, the amount of data in social media, blogs and forums rapidly increases and it is time consuming for security services to monitor all these sources. Therefore, it is important to have a system that...
Revealing underlying causal structure in social media is critical to understanding how users interact, on which a lot of security intelligence applications can be built. Existing causal inference methods for social media usually rely on limited explicit causal context, pre-assume certain user interaction model, or neglect the nonlinear nature of social interaction, which could lead to bias estimations...
We previously proposed the artificial fiber (AF) patterns in order to be able to hide information in printed documents. AF pattern uses the features of the medium (e.g., paper). It has features of rotational invariance, low visibility of the hidden information. But it still suffered extraction threshold instability when using a camera to extract the information. This problem has now been overcome...
Social media systems like Twitter and Facebook provide a global infrastructure for sharing information, and in one popular direction, of sharing web hyperlinks. Understanding the behavioral signals of both how URLs are inserted into these systems (via posting by users) and how URLs are received by social media users (via clicking) can provide new insights into social media search, recommendation,...
As a bridge between social media and physical space, location information will potentially make the internet smarter, and release the real power of social media to address the serious and significant problems in the real world. However, in terms of privacy and security, most of the users are unwilling to make their locations public. To address the problem, an algorithm is necessary to predict the...
We collected social media network data from the site Twitter to explore the ‘language of the wire’ and how users of digital environments conceptualise trust. Our underlying aim is to gather insights that can inform the design of an interface that assists users to negotiate trust. From our pilot study exploring and developing new methods, we found that the words ‘love’, ‘faith’, ‘god’ and ‘believe’...
Phishing, elicitation, and impersonation techniques are performed using multiple forms, targeting content specific to the delivery modality, such as email, social media, and general browser communications. Education to increase awareness is one mechanism to combat phishing. Average email and internet users are less attentive to media warnings and training materials provided by employers than they...
There have been many research efforts to secure Android applications and the high-level system mechanisms. The low-level operating system designs have been overlooked partially due to the belief that security issues at this level are similar to those on Linux, which are well-studied. However, we identify that certain Android modifications are at odds with security and result in serious vulnerabilities...
In t his demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being played back as expected. Furthermore, we...
The first casualty of power politics, advocacy journalism, dark propaganda, rumor mills, and media-politico echo chambers is truth. Here's a defensive tactic for your consideration.
Social media has expanded the ability of people to interact and share information, but without appropriate guidelines, a company might encounter trouble in cyberspace. The Web extra at http://youtu.be/qBtRWj8cQTw is an audio recording from the Computing and the Law column, in which the author discusses how social media has expanded the ability of people to interact and share information, but without...
Collaboration technologies are being used in healthcare research, practice, and management. However, they have potential for even greater use especially in the light of healthcare reforms currently occurring throughout many countries and their greater emphasis on technology to facilitate superior healthcare delivery. Geographically dispersed health professionals can use collaboration technology to...
In this demo we show a practical attack against the built-in media player feature of Smart TVs. We created a malicious media file that will compromise the target TV during playback. This gives a remote attacker full, permanent control over the device, including all of its peripherals. The victim, however, cannot detect the attack, as the media file is being played back as expected. Furthermore, we...
Recent researches in steganography get used to hire one cover image as a host image. In this paper, a novel method was proposed to use two cover images as host images with one secret (stego) image. The main principle of using two host images is to increase the security in the receiver side when sending each host image alone in different times. The first phase starts with sending the first cover image...
Telecommunications and the Internet are forming an increasingly integrated system for processing, storing, accessing and distributing information and managing content. Recently the content space is expanding by cognitive and sensory contents, billions of devices are to be interconnected, media convergence is highlighted and an open Digital Ecosystem is being formed. At the same time the identification...
Internet usage in rural areas of most developing nations has not been encouraging. Telecom operators have not found it commercially viable to offer internet services in rural areas because of low revenue and scarcity of electrical power. Small internet service providers have not succeeded because existing solutions have been complex to install and operate, leading to increased costs. The authors present...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.