29,680 research outputs found

    Dynamics of private social networks

    Get PDF
    Social networks, have been a significant turning point in ways individuals and companies interact. Various research has also revolved around public social networks, such as Twitter and Facebook. In most cases trying to understand what's happening in the network such predicting trends, and identifying natural phenomenon. Seeing the growth of public social networks several corporations have sought to build their own private networks to enable their staff to share knowledge, and expertise. Little research has been done in regards to the value private networks give to their stake holders. This is primarily due to the fact as their name implies, these networks are private, thus access to internal data is limited to a trusted few. This paper looks at a particular online private social network, and seeks to investigate the research possibilities made available, and how this can bring value to the organisation which runs the network. Notwithstanding the limitations of the network, this paper seeks to explore the connections graph between members of the network, as well as understanding the topics discussed within the network. The findings show that by visualising a social network one can assess the success or failure of their online networks. The Analysis conducted can also identify skill shortages within areas of the network, thus allowing corporations to take action and rectify any potential problems.peer-reviewe

    Potential mass surveillance and privacy violations in proximity-based social applications

    Get PDF
    Proximity-based social applications let users interact with people that are currently close to them, by revealing some information about their preferences and whereabouts. This information is acquired through passive geo-localisation and used to build a sense of serendipitous discovery of people, places and interests. Unfortunately, while this class of applications opens different interactions possibilities for people in urban settings, obtaining access to certain identity information could lead a possible privacy attacker to identify and follow a user in their movements in a specific period of time. The same information shared through the platform could also help an attacker to link the victim's online profiles to physical identities. We analyse a set of popular dating application that shares users relative distances within a certain radius and show how, by using the information shared on these platforms, it is possible to formalise a multilateration attack, able to identify the user actual position. The same attack can also be used to follow a user in all their movements within a certain period of time, therefore identifying their habits and Points of Interest across the city. Furthermore we introduce a social attack which uses common Facebook likes to profile a person and finally identify their real identity

    Proportionality and its Applicability in the Realm of Cyber Attacks

    Get PDF
    With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater. States now have the ability to cause unprecedented civilian loss with their cyber actions. States can destroy financial records, disrupt stock markets, manipulate cryptocurrency, shut off nuclear reactors, turn off power grids, open dams, and even shut down air traffic control systems with the click of a mouse. This article argues that any cyber-attack launched with a reasonable expectation to inflict “incidental loss of civilian life, injury to civilians, or damage to civilian objects,” must be subject to the existing laws of proportionality. This article further examines the broader concept of proportionality, and the difficulties associated with applying a proportionality analysis to an offensive cyber-strike. This paper asserts that the ambiguities and complexities associated with applying the law of proportionality—in its current state and within a cyber context—will leave civilian populations vulnerable to the aggressive cyber actions of the world’s cyber powers. Consequently, this article stresses the necessity of developing a proportionality standard within a unified international cyberwarfare convention and asserts that such a standard is required in order to prevent the creation of a pathway towards lethal cyber aggressions unrestrained by the laws of war
    • …
    corecore