1,536 research outputs found

    Reputation Systems: A framework for attacks and frauds classification

    Get PDF
    Reputation and recommending systems have been widely used in e-commerce, as well as online collaborative networks, P2P networks and many other contexts, in order to provide trust to the participants involved in the online interaction. Based on a reputation score, the e-commerce user feels a sense of security, leading the person to trust or not when buying or selling. However, these systems may give the user a false sense of security due to their gaps. This article discusses the limitations of the current reputation systems in terms of models to determine the reputation score of the users. We intend to contribute to the knowledge in this field by providing a systematic overview of the main types of attack and fraud found in those systems, proposing a novel framework of classification based on a matrix of attributes. We believe such a framework could help analyse new types of attacks and fraud. Our work was based on a systematic literature review methodology.info:eu-repo/semantics/publishedVersio

    Yellow Tokens: From Racist Depictions to Token Minorities

    Get PDF
    The project argues that the misrepresentation of Asians in film is a direct result of white supremacy. It researches the presentation of East Asian Americans in films as a result of the hegemonic ideology of whiteness, focusing on the standard of movie star perfection as a form of white supremacy, and includes films that have white men and women cast in lead roles, even when the story is uniquely Asian. Using the theoretical lens of whiteness studies the project analyzes examples from the American film industry from the past fifteen years

    The implications of shared identity on indirect reciprocity

    Get PDF
    The ability to sustain indirect reciprocity is an example of collective intelligence. It is increasingly relevant to future technology and autonomous machines that need to function in a coalition. Indirect reciprocity involves providing benefit to others without guaranteeing a future return. The identity through which an agent presents itself to others is fundamental, as this is how the reputation of an agent is considered. In this paper, we examine the sharing of identity between agents, which is an important and frequently overlooked issue when considering indirect reciprocity. We model an agent's identity using traits, which can be shared with other agents, and offer a basis for an agent to change their identity. Through this approach, we determine how shared identity affects cooperation, and the conditions through which cooperation can be sustained. This also helps us to understand how and why behavioural strategies involving identity function are put in place, such as whitewashing. The framework offers the opportunity to assess the interplay between the sharing of traits and the cost, in terms of reduced cooperation and opportunities for shirkers to benefit

    Identities and intimacies on social media:Transnational perspectives

    Get PDF

    Identities and intimacies on social media:Transnational perspectives

    Get PDF

    Useful Victims: Symbolic Rage and Racist Violence on the Global Extreme-Right

    Get PDF
    The extreme-right has long relied on false claims of anti-White violence and racialized victimhood narratives in order to promote violence and advance their ideology. By carefully curating a ‘siege mentality’ among adherents, extremist writers and ‘philosophers’ have positioned whiteness as something under attack, and mobilized the ideas of demographic peril and endangered whiteness in order to justify rhetorical and physical violence against people of color and minority communities. This mythology has been a constant feature of the publications and propaganda of far-right groups around the world, and has been used to further the constructed image of extremist racist organizations as protectors of both whiteness and womanhood. This rhetoric has been used to radicalize individuals to the point at which they see violence as acceptable and necessary – an oft-repeated process which reached its most recent tragic conclusion in 2016 when a white man murdered 9 worshippers at the Emanuel African Methodist Episcopal Church in Charleston, South Carolina, saying to one victim; “you rape our women… you have to go”. This article analyzes the ways in which extremist right-wing groups in South Africa, the United Kingdom and United States have historically constructed the threat of anti-White violence and mobilized it in order to spread hate and radicalize individuals towards violent action. I argue that the extreme-right has consistently perpetuated a mythology surrounding race and sexuality in order to justify continued rhetorical and physical violence against communities of color, LGBTQ people, and the Jewish community

    Identities and Intimacies on Social Media

    Get PDF
    This edited collection illuminates the scope with which identities and intimacies interact on a wide range of social media platforms. A varied range of international scholars examine the contexts of very different social media spaces, with topics ranging from whitewashing and memes, parental discourses in online activities, Spotify as an intimate social media platform, neoliberalisation of feminist discourses, digital sex work, social media wars in trans debates and ‘BimboTok’. The focus is on their acceleration and impact due to the specificities of social media in relation to identities, intimacies within the broad ‘political’ sphere. The geographic range of case study material reflects the global impact of social media, and includes data from Belgium, Canada, China, France, Germany, Greece, Italy, Portugal, Spain, Sweden and the USA. This enlightening and rigorous collection will be of key interest to scholars in media studies and gender studies, and to scholars and professionals of social media. The Open Access version of this book, available at www.taylorfrancis.com, has been made available under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license

    A reputation framework for behavioural history: developing and sharing reputations from behavioural history of network clients

    Get PDF
    The open architecture of the Internet has enabled its massive growth and success by facilitating easy connectivity between hosts. At the same time, the Internet has also opened itself up to abuse, e.g. arising out of unsolicited communication, both intentional and unintentional. It remains an open question as to how best servers should protect themselves from malicious clients whilst offering good service to innocent clients. There has been research on behavioural profiling and reputation of clients, mostly at the network level and also for email as an application, to detect malicious clients. However, this area continues to pose open research challenges. This thesis is motivated by the need for a generalised framework capable of aiding efficient detection of malicious clients while being able to reward clients with behaviour profiles conforming to the acceptable use and other relevant policies. The main contribution of this thesis is a novel, generalised, context-aware, policy independent, privacy preserving framework for developing and sharing client reputation based on behavioural history. The framework, augmenting existing protocols, allows fitting in of policies at various stages, thus keeping itself open and flexible to implementation. Locally recorded behavioural history of clients with known identities are translated to client reputations, which are then shared globally. The reputations enable privacy for clients by not exposing the details of their behaviour during interactions with the servers. The local and globally shared reputations facilitate servers in selecting service levels, including restricting access to malicious clients. We present results and analyses of simulations, with synthetic data and some proposed example policies, of client-server interactions and of attacks on our model. Suggestions presented for possible future extensions are drawn from our experiences with simulation

    A layered security approach for cooperation enforcement in MANETs

    Get PDF
    In fully self-organized MANETs, nodes are naturally reluctant to spend their precious resources forwarding other nodes' packets and are therefore liable to exhibit selfish or sometimes malicious behaviour. This selfishness could potentially lead to network partitioning and network performance degradation. Cooperation enforcement schemes, such as reputation and trust based schemes have been proposed to counteract the issue of selfishness. The sole purpose of these schemes is to ensure selfish nodes bear the consequences of their bad actions. However, malicious nodes can exploit mobility and free identities available to breach the security of these systems and escape punishment or detection. Firstly, in the case of mobility, a malicious node can gain benefit even after having been detected by a reputation-based system, by interacting directly with its source or destination nodes. Secondly, since the lack of infrastructure in MANETs does not suit centralized identity management or centralized Trusted Third Parties, nodes can create zero-cost identities without any restrictions. As a result, a selfish node can easily escape the consequences of whatever misbehaviour it has performed by simply changing identity to clear all its bad history, known as whitewashing. Hence, this makes it difficult to hold malicious nodes accountable for their actions. Finally, a malicious node can concurrently create and control more than one virtual identity to launch an attack, called a Sybil attack. In the context of reputation-based schemes, a Sybil attacker can disrupt the detection accuracy by defaming other good nodes, self-promoting itself or exchanging bogus positive recommendations about one of its quarantined identities. This thesis explores two aspects of direct interactions (DIs), i. e. Dis as a selfish nodes' strategy and Dis produced by inappropriate simulation parameters. In the latter case DIs cause confusion in the results evaluation of reputation-based schemes. We propose a method that uses the service contribution and consumption information to discourage selfish nodes that try to increase their benefit through DIs. We also propose methods that categorize nodes' benefits in order to mitigate the confusion caused in the results evaluation. A novel layered security approach is proposed using proactive and reactive paradigms to counteract whitewashing and Sybil attacks. The proactive paradigm is aimed at removing the advantages that whitewashing can provide by enforcing a non-monetary entry fee per new identity, in the form of cooperation in the network. The results show that this method deters these attackers by reducing their benefits in the network. In the reactive case, we propose a lightweight approach to detect new identities of whitewashers and Sybil attackers on the MAC layer using the 802.11 protocol without using any extra hardware. The experiments show that a signal strength based threshold exists which can help us detect Sybil and whitewashers' identities. Through the help of extensive simulations and real-world testbed experimentations, we are able to demonstrate that our proposed solution detects Sybil or whitewashers' new identities with good accuracy and reduces the benefits of malicious activity even in the presence of mobility

    The battle of Detroit and anti-communism in the depression era

    Get PDF
    This article is an exploration of Diego Rivera's visit to Detroit in 1932-3. It seeks to use his experiences, and in particular the spectacular popular reaction to the Detroit Industry murals he pointed, as a prism for anaylsing varieties of anti-communism in. Detroit in the depression era. The article argues that close relationships between Private capitalists, most notably Hen?)) Ford and a Mexican communist, expose contradictions in big business's use of anti-communism in the interwar period, and suggest that anti-communism was a more complicated phenomenon than simply a tool for the promotion of free enterprise'. Moreover, by comparing the public reaction to the artists' work with their original intent, it is possible to see how members of Detroit's society unconsciously, used anti-communism to sublimate broader concerns over race and ethnicity gender, politics, and religiosity in a region in the throes of profound social change. The article seeks to highlight elements of these latent anxieties and fears in order to show how anti-communism acted as a vessel for social debate
    corecore