1,156 research outputs found
Sticks and Stones May Break My Bones but Words Will Never Hurt Me...Until I See Them: A Qualitative Content Analysis of Trolls in Relation to the Gricean Maxims and (IM)Polite Virtual Speech Acts
The troll is one of the most obtrusive and disruptive bad actors on the internet. Unlike other bad actors, the troll interacts on a more personal and intimate level with other internet users. Social media platforms, online communities, comment boards, and chatroom forums provide them with this opportunity. What distinguishes these social provocateurs from other bad actors are their virtual speech acts and online behaviors. These acts aim to incite anger, shame, or frustration in others through the weaponization of words, phrases, and other rhetoric. Online trolls come in all forms and use various speech tactics to insult and demean their target audiences. The goal of this research is to investigate trolls\u27 virtual speech acts and the impact of troll-like behaviors on online communities. Using Gricean maxims and politeness theory, this study seeks to identify common vernacular, word usage, and other language behaviors that trolls use to divert the conversation, insult others, and possibly affect fellow internet users’ mental health and well-being
Mobilizing the Trump Train: Understanding Collective Action in a Political Trolling Community
Political trolls initiate online discord not only for the lulz (laughs) but
also for ideological reasons, such as promoting their desired political
candidates. Political troll groups recently gained spotlight because they were
considered central in helping Donald Trump win the 2016 US presidential
election, which involved difficult mass mobilizations. Political trolls face
unique challenges as they must build their own communities while simultaneously
disrupting others. However, little is known about how political trolls mobilize
sufficient participation to suddenly become problems for others. We performed a
quantitative longitudinal analysis of more than 16 million comments from one of
the most popular and disruptive political trolling communities, the subreddit
/r/The\_Donald (T\D). We use T_D as a lens to understand participation and
collective action within these deviant spaces. In specific, we first study the
characteristics of the most active participants to uncover what might drive
their sustained participation. Next, we investigate how these active
individuals mobilize their community to action. Through our analysis, we
uncover that the most active employed distinct discursive strategies to
mobilize participation, and deployed technical tools like bots to create a
shared identity and sustain engagement. We conclude by providing data-backed
design implications for designers of civic media
Damage Detection and Mitigation in Open Collaboration Applications
Collaborative functionality is changing the way information is amassed, refined, and disseminated in online environments. A subclass of these systems characterized by open collaboration uniquely allow participants to *modify* content with low barriers-to-entry. A prominent example and our case study, English Wikipedia, exemplifies the vulnerabilities: 7%+ of its edits are blatantly unconstructive. Our measurement studies show this damage manifests in novel socio-technical forms, limiting the effectiveness of computational detection strategies from related domains. In turn this has made much mitigation the responsibility of a poorly organized and ill-routed human workforce. We aim to improve all facets of this incident response workflow.
Complementing language based solutions we first develop content agnostic predictors of damage. We implicitly glean reputations for system entities and overcome sparse behavioral histories with a spatial reputation model combining evidence from multiple granularity. We also identify simple yet indicative metadata features that capture participatory dynamics and content maturation. When brought to bear over damage corpora our contributions: (1) advance benchmarks over a broad set of security issues ( vandalism ), (2) perform well in the first anti-spam specific approach, and (3) demonstrate their portability over diverse open collaboration use cases.
Probabilities generated by our classifiers can also intelligently route human assets using prioritization schemes optimized for capture rate or impact minimization. Organizational primitives are introduced that improve workforce efficiency. The whole of these strategies are then implemented into a tool ( STiki ) that has been used to revert 350,000+ damaging instances from Wikipedia. These uses are analyzed to learn about human aspects of the edit review process, properties including scalability, motivation, and latency. Finally, we conclude by measuring practical impacts of work, discussing how to better integrate our solutions, and revealing outstanding vulnerabilities that speak to research challenges for open collaboration security
Unsolicited commercial e-mail (spam): integrated policy and practice
The internet offers a cost-effective medium to build better relationships with customers than has been possible with traditional marketing media. Internet technologies, such as electronic mail, web sites and digital media, offer companies the ability to expand their customer reach, to target specific communities, and to communicate and interact with customers in a highly customised manner. In the last
few years, electronic mail has emerged as an important marketing tool to build and maintain closer relationships both with customers and with prospects. E-mail marketing has become a popular choice for companies as it greatly reduces the costs associated with previously conventional methods such as direct mailing, cataloguing (i.e. sending product catalogues to potential customers) and telecommunication
marketing. As small consumers obtain e-mail addresses, the efficiency of using e-mail as a marketing tool will grow. While e-mail may be a boon for advertisers, it is a problem for consumers, corporations and internet service providers since it is used for sending 'spam' (junk-mail). Unsolicited commercial e-mail (UCE), which is commonly called spam, impinges on the privacy of individual internet users. It can
also cost users in terms of the time spent reading and deleting the messages, as well as in a direct financial sense where users pay time-based connection fees. Spam, which
most frequently takes the form of mass mailing advertisements, is a violation of internet etiquette (EEMA, 2002). This thesis shows that spam is an increasing problem for information society citizens. For the senders of spam, getting the message to millions of people is easy and cost-effective, but for the receivers the cost of receiving spam is financial, time-consuming, resource-consuming, possibly offensive or even illegal, and also dangerous for information systems. The problem is recognised by governments who
have attempted legislative measures, but these have had little impact because of the combined difficulties of crossing territorial boundaries and of continuously evasive originating addresses. Software developers are attempting to use technology to tackle the problem, but spammers keep one step ahead, for example by adapting subject headings to avoid filters. Filters have difficulty differentiating between legitimate e-mail and unwanted e-mail, so that while we may reduce our junk we may also reduce our wanted messages.
Putting filter control into the hands of individual users results in an unfair burden, in that there is a cost of time and expertise from the user. Where filter control is outsourced to expert third parties, solving the time and expertise problems, the cost becomes financial. Given the inadequacy of legislation, and the unreliability of technical applications to resolve the problem, there is an unfair burden on information
society citizens.
This research has resulted in the conclusion that cooperation between legislation and technology is the most effective way to handle and manage spam, and that therefore a defence in depth should be based on a combination of those two strategies. The thesis reviews and critiques attempts at legislation, self-regulation and technical solutions. It presents a case for an integrated and user-oriented approach, and provides recommendations
Assessing the language of chat for teamwork dialogue
In technology enhanced language learning, many pedagogical activities involve students in online discussion such as synchronous chat, in order to help them practice their language skills. Besides developing the language competency of students, it is also crucial to nurture their teamwork competencies for today's global and complex environment. Language communication is an important glue of teamwork. In order to assess the language of chat for teamwork dimensions, several text mining methods are pos sible. However, difficulties arise such as pre-processing being a black box and classification approaches and algorithms being dependent on the context. To address these issues, the study will evaluate and explain preprocessing and classification methods used to analyze teamwork dialogue from a dataset of chat data. Analytics methods evaluated in this study provide a direction for assessing the language of chat for teamwork dialogue and can help extend the work of technology enhanced language learning to n ot only focus on academic competency, but on the communication aspect too
The effects of security protocols on cybercrime at Ahmadu Bello University, Zaria, Nigeria.
Masters Degree. University of KwaZulu-Natal, Durban.The use of Information Communication Technology (ICT) within the educational
sector is increasing rapidly. University systems are becoming increasingly
dependent on computerized information systems (CIS) in order to carry out their
daily routine. Moreover, CIS no longer process staff records and financial data
only, as they once did. Nowadays, universities use CIS to assist in automating
the overall system. This automation includes the use of multiple databases, data
detail periodicity (i.e. gender, race/ethnicity, enrollment, degrees granted, and
program major), record identification (e.g. social security number ‘SSN’), linking
to other databases (i.e. linking unit record data with external databases such as
university and employment data).
The increasing demand and exposure to Internet resources and infrastructure by
individuals and universities have made IT infrastructure easy targets for
cybercriminals who employ sophisticated attacks such as Advanced Persistent
Threats, Distributed Denial of Service attacks and Botnets in order to steal
confidential data, identities of individuals and money. Hence, in order to stay in
business, universities realise that it is imperative to secure vital Information
Systems from easily being exploited by emerging and existing forms of
cybercrimes. This study was conducted to determine and evaluate the various
forms of cybercrimes and their consequences on the university network at
Ahmadu Bello University, Zaria. The study was also aimed at proposing means
of mitigating cybercrimes and their effects on the university network. Hence, an
exploratory research design supported by qualitative research approach was
used in this study. Staff of the Institute of Computing, Information and
Communication technology (ICICT) were interviewed. The findings of the study
present different security measures, and security tools that can be used to
effectively mitigate cybercrimes. It was found that social engineering, denial of
service attacks, website defacement were among the types of cybercrimes
occurring on the university network. It is therefore recommended that behavioural
approach in a form of motivation of staff behaviour, salary increases, and cash
incentive to reduce cybercrime perpetrated by these staff
Deep Learning for User Comment Moderation
Experimenting with a new dataset of 1.6M user comments from a Greek news
portal and existing datasets of English Wikipedia comments, we show that an RNN
outperforms the previous state of the art in moderation. A deep,
classification-specific attention mechanism improves further the overall
performance of the RNN. We also compare against a CNN and a word-list baseline,
considering both fully automatic and semi-automatic moderation
- …