198 research outputs found

    New Kids on the Net. Deutschsprachige Philosophie elektronisch\ud

    Get PDF
    Mailing lists tend to be shaped by core groups of dedicated participants, developing their interests and opinions in front of a predominantly receptive audience of subscribers. A new kind of communicative praxis is established on top of some guidelines on how computers should exchange data: participation in quasi-instantaneous, globally distributed, non-hierarchical discursive interchange. Computer networks, as is well known, are not confined by any historical or geographical borders. As a consequence, the cultural impact of the technical devices seems to affect arbitrary collections of users availing themselves of the necessary equipment and know-how. One of the most dazzling experiences of communication on the net, it has correctly been pointed\ud out, is its global egalitarianism. While it is true that large parts of the planet are still excluded and the predominance of the English language imposes important\ud constraints on the participants, it is difficult to avoid an initial euphoria, a cosmopolitan state of mind, as one becomes familiar with a machinery that can support spatially unlimited cooperation between equals with a minimum of\ud administrative overhead

    Unsolicited commercial e-mail (spam): integrated policy and practice

    Get PDF
    The internet offers a cost-effective medium to build better relationships with customers than has been possible with traditional marketing media. Internet technologies, such as electronic mail, web sites and digital media, offer companies the ability to expand their customer reach, to target specific communities, and to communicate and interact with customers in a highly customised manner. In the last few years, electronic mail has emerged as an important marketing tool to build and maintain closer relationships both with customers and with prospects. E-mail marketing has become a popular choice for companies as it greatly reduces the costs associated with previously conventional methods such as direct mailing, cataloguing (i.e. sending product catalogues to potential customers) and telecommunication marketing. As small consumers obtain e-mail addresses, the efficiency of using e-mail as a marketing tool will grow. While e-mail may be a boon for advertisers, it is a problem for consumers, corporations and internet service providers since it is used for sending 'spam' (junk-mail). Unsolicited commercial e-mail (UCE), which is commonly called spam, impinges on the privacy of individual internet users. It can also cost users in terms of the time spent reading and deleting the messages, as well as in a direct financial sense where users pay time-based connection fees. Spam, which most frequently takes the form of mass mailing advertisements, is a violation of internet etiquette (EEMA, 2002). This thesis shows that spam is an increasing problem for information society citizens. For the senders of spam, getting the message to millions of people is easy and cost-effective, but for the receivers the cost of receiving spam is financial, time-consuming, resource-consuming, possibly offensive or even illegal, and also dangerous for information systems. The problem is recognised by governments who have attempted legislative measures, but these have had little impact because of the combined difficulties of crossing territorial boundaries and of continuously evasive originating addresses. Software developers are attempting to use technology to tackle the problem, but spammers keep one step ahead, for example by adapting subject headings to avoid filters. Filters have difficulty differentiating between legitimate e-mail and unwanted e-mail, so that while we may reduce our junk we may also reduce our wanted messages. Putting filter control into the hands of individual users results in an unfair burden, in that there is a cost of time and expertise from the user. Where filter control is outsourced to expert third parties, solving the time and expertise problems, the cost becomes financial. Given the inadequacy of legislation, and the unreliability of technical applications to resolve the problem, there is an unfair burden on information society citizens. This research has resulted in the conclusion that cooperation between legislation and technology is the most effective way to handle and manage spam, and that therefore a defence in depth should be based on a combination of those two strategies. The thesis reviews and critiques attempts at legislation, self-regulation and technical solutions. It presents a case for an integrated and user-oriented approach, and provides recommendations

    Characterization and modeling of top spam botnets

    Get PDF
    The increasing impact of the Internet in the global economy has transformed Botnets into one of the most relevant security threats for citizens, organizations and governments. Despite the significant efforts that have been made over the last years to understand this phenomenon and develop detection techniques and countermeasures, this continues to be a field with big challenges to address. Several approaches can be taken to study Botnets: analyze its source code, which can be a hard task because it is usually unavailable; study the control mechanism, particularly the activity of its Command and Control server(s); study its behavior, by measuring real traffic and collecting relevant statistics. In this work, we have installed some of the most popular spam Botnets, captured the originated traffic and characterized it in order to identify the main trends/patterns of their activity. From the intensive statistics that were collected, it was possible to conclude that there are distinct features between Botnets that can be explored to build efficient detection methodologies. Based on this study, the second part of the paper proposes a generic and systematic model to describe the network dynamics whenever a Botnet threat is detected, defining all actors, dimensions, states and actions that need to be taken into account at each moment. We believe that this type of modeling approach is the basis for developing systematic and integrated frameworks and strategies to predict and fight Botnet threats in an efficient way.This research was supported by Fundação para a Ciência e a Tecnologia, under research project PTDC/EEA-TEL/101880/2008

    Innovation for political activism

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2008.Includes bibliographical references (leaves 134-142).This thesis presents contestational design, a unique form of design activity whose aim is promote particular agendas in contested political arenas. I propose a framework for analyzing contestational design processes, which I then apply to two initiatives that developed communications infrastructure for activist groups. The first case study is TXTmob, an SMS-broadcast system that I developed with an ad-hoc coalition of activists to support mass mobilizations during the 2004 Democratic and Republican National Conventions. It has been used by thousands of people and has inspired new projects in both the nonprofit and commercial sectors. The second case study is Dialup Radio, a telephone-based independent media system that I developed with a civil society organization in Zimbabwe. It was intended to disseminate activist information, particularly to Zimbabwe's rural poor. Despite limited infrastructure and government restrictions, several prototypes were produced and tested in Zimbabwe. After describing each case study individually, I turn to a comparison of their respective processes and the artifacts that each produced. Examining the cases side by side, I identify a set of common issues with which contestational designers contend at various points in the design process. Finally, I describe a set of organizing principles that distinguish contestational design from other kinds of design activity.Tad Hirsch.Ph.D

    Prepare for VoIP Spam

    Get PDF

    From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions

    Get PDF
    In the past few decades, the rise in attacks on communication devices in networks has resulted in a reduction of network functionality, throughput, and performance. To detect and mitigate these network attacks, researchers, academicians, and practitioners developed Intrusion Detection Systems (IDSs) with automatic response systems. The response system is considered an important component of IDS, since without a timely response IDSs may not function properly in countering various attacks, especially on a real-time basis. To respond appropriately, IDSs should select the optimal response option according to the type of network attack. This research study provides a complete survey of IDSs and Intrusion Response Systems (IRSs) on the basis of our in-depth understanding of the response option for different types of network attacks. Knowledge of the path from IDS to IRS can assist network administrators and network staffs in understanding how to tackle different attacks with state-of-the-art technologies

    When traditional advocacy goes high-tech

    Get PDF
    This thesis defines the essentials of activism and gives examples of online technology that can assist grassroots organizations in promoting positive change within their communities. I discuss existing online technologies that make it possible for grassroots organizations to enhance the traditional (non-Internet-based) approaches to activism. Online activism is a growing trend among non-profit organizations. Several online awards are given to organizations that have noticeably pursued online pursuit of electronic advocacy. From making telephone calls to organizing demonstrations, grassroots groups can begin saving money, time, and human resources. The Internet frees people from physical barriers and borders. I have investigated current online technologies that can be used to supplement traditional activism services. I give one example per approach that can be used online. The examples include self-education, promoting your organization\u27s message, successful online actions, information distribution, corporate utilization, and the future of online activism. Examples of activism in this report focus on non-violent advocacy or civil disobedience. I have researched online activism through the use of periodicals, books, World Wide Web Internet searches, and interviews with advocacy specialists. This report offers evidence that the Internet has changed, and will continue to change, the paradigm of political and social activism. By providing increased access using new, fast, and efficient technology, more people are able to have a greater say in shaping their worlds

    A method for securing online community service: A study of selected Western Australian councils

    Get PDF
    Since the Internet was made publicly accessible, it has become increasingly popular and its deployment has been broad and global thereby facilitating a range of available online services such as Electronic Mail (email), news or bulletins, Internet Relay Chat (IRC) and World Wide Web (WWW). Progressively, other online services such as telephony, video conference, video on demand, Interactive Television (ITV) and Geographic Information System (GIS) have been integrated with the Internet and become publicly available. Presently, Internet broadband communication services incorporating both wired and wireless network technologies has seen the emergence of the concept of a digital community which has been growing and expanding rapidly around the world. Internet and the ever expanding online services to the wider digital community has raised the issue of security of these services during usage. Most local councils throughout Western Australia have resorted to delivering online services such as library, online payments and email accessibility. The provision and usage of these services have inherent security risks. Consequently, this study investigated the concept of a secure digital community in the secure provision and usage of these online services in selected local councils in Western Australia (WA). After an extensive review of existing literature, information security frameworks were derived from the adaptation of various resources, such as the OSSTMM 2.2 Section C: Internet Technology Security benchmark which was used as the main template. In addition, this template was enhanced into a framework model by incorporating other benchmarks such as NIST, CIS, ISSAF as well as other sources of information. These included information security related books, related ICT network and security websites such as CERT, CheckPoint, Cisco, GFI, Juniper, MS, NESSUS and NMAP together with journals and personal interviews. The proposed information security frameworks were developed to enhance the level of security strength of the email and online web systems as well as to increase the level of confidence in the system security within the selected local councils in WA. All the investigative studies were based upon the available selected local councils’ data and the associated analyses of the results as obtained from the testing software. In addition, the interpretive multiple-case study principles were used during the investigation to achieve or fulfil the purpose of this study. The findings from this study were then abstracted for use in a framework and made available for use as a model for possible adaptation and implementation to other similarly structured councils or organisations. As a result, the study confirmed that the proposed information security frameworks have the capability and potential to improve the level of security strength. In addition, the level of satisfaction and confidence of council staff of the selected local councils in WA in the system security would also be increased due to the application of these frameworks. Although these information security frameworks may be recommended as practical and supporting tools for local councils, the findings from this study were specific only to the selected local councils used in this study. Further research using other councils, may be necessary in order for the information security frameworks to be adopted within a wider range of councils or organisations in WA or elsewhere
    • …
    corecore