81 research outputs found
A systematic survey of online data mining technology intended for law enforcement
As an increasing amount of crime takes on a digital aspect, law enforcement bodies must tackle an online environment generating huge volumes of data. With manual inspections becoming increasingly infeasible, law enforcement bodies are optimising online investigations through data-mining technologies. Such technologies must be well designed and rigorously grounded, yet no survey of the online data-mining literature exists which examines their techniques, applications and rigour. This article remedies this gap through a systematic mapping study describing online data-mining literature which visibly targets law enforcement applications, using evidence-based practices in survey making to produce a replicable analysis which can be methodologically examined for deficiencies
Recommended from our members
The threat of cyberterrorism: Contemporary consequences and prescriptions
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices
Recommended from our members
Dialogue Systems Specialized in Social Influence: Systems, Methods, and Ethics
This thesis concerns the task of how to develop dialogue systems specialized in social influence and problems around deploying such systems. Dialogue systems have become widely adopted in our daily life. Most dialogue systems are primarily focused on information-seeking tasks or social companionship. However, they cannot apply strategies in complex and critical social influence tasks, such as healthy habit promotion, emotional support, etc. In this work, we formally define social influence dialogue systems to be systems that influence users’ behaviors, feelings, thoughts, or opinions through natural conversations. We also present methods to make such systems intelligible, privacy-preserving, and thus deployable in real life. Finally, we acknowledge potential ethical issues around social influence systems and propose solutions to mitigate them in Chapter 6.
Social influence dialogues span various domains, such as persuasion, negotiation, and recommendation. We first propose a donation persuasion task, PERSUASIONFORGOOD, and ground our study on this persuasion task for social good. We then build a persuasive dialogue system, by refining the dialogue model for intelligibility and imitating human experts for persuasiveness, and a negotiation agent that can play the game of Diplomacy by decoupling the planning engine and the dialogue generation module to improve controllability of social influence systems. To deploy such a system in the wild, our work examines how humans perceive the AI agent’s identity, and how their perceptions impact the social influence outcome. Moreover, dialogue models are trained on conversations, where people could share personal information. This creates privacy concerns for deployment as the models may memorize private information.
To protect user privacy in the training data, our work develops privacy-preserving learning algorithms to ensure deployed models are safe under privacy attacks. Finally, deployed dialogue agents have the potential to integrate human feedback to continuously improve themselves. So we propose JUICER, a framework to make use of both binary and free-form textual human feedback to augment the training data and keep improving dialogue model performance after deployment. Building social influence dialogue systems enables us to research future expert-level AI systems that are accessible via natural languages, accountable with domain knowledge, and privacy-preserving with privacy guarantees
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Code the Code: Surveillance Capitalism, Education, and the Critical Theory of Technology
Abstract
This study is a theoretical examination of surveillance capitalism’s influence on educational technology. While the neoliberal era saw increased teacher accountability measures result in the encouraged expansion of for-profit educational technologies competing with traditional public education, surveillance capitalism’s educational technologies are distinctive. Theory has the power to reveal the existence of values embedded in the designs of these new technologies as well as the ways certain interests act through them. The researcher argues that Andrew Feenberg’s Critical Theory of Technology presents a framework for critique, intervention, and transformation of these technologies, but it must first be updated with David M. Berry’s (2014) Critical Theory and the Digital. Following this update, a new potential for critique and transformation emerges by introducing conceptual foundations (gestalt switch and choice of a past) and potentials (platform cooperativism and technography and social analytics). The author concludes by presenting new configurations of existing surveillance capitalist educational technologies as well as a concept for a curriculum intended to establish a balance of power between students and these technologies
Strategic framework to minimise information security risks in the UAE
A thesis submitted to the University of Bedfordshire in partial fulfilment of the requirements for the PhD degreeThe transition process to ICT (Information and Communication Technology) has had significant influence on different aspects of society. Although the computerisation process has motivated the alignment of different technical and human factors with the expansion process, the technical pace of the transition surpasses the human adaptation to change. Much research on ICT development has shown that ICT security is essentially a political and a managerial act that must not disregard the importance of the relevant cultural characteristics of a society.
Information sharing is a necessary action in society to exchange knowledge and to enable and facilitate communication. However, certain information should be shared only with selected parties or even kept private. Information sharing by humans forms the main obstacle to security measure undertaken by organisations to protect their assets. Moreover, certain cultural traits play a major role in thwarting information security measures. Arab culture of the United Arab Emirates is one of those cultures with strong collectivism featuring strong ties among individuals. Sharing sensitive information including passwords of online accounts can be found in some settings in some cultures, but with reason and generally on a small scale. However, this research includes a study on 3 main Gulf Cooperation Council (GCC) countries, namely, Saudi Arabia (KSA), United Arab Emirates (UAE) and Oman, showing that there is similar a significant level of sensitive information sharing among employees in the region. This is proven to highly contribute to compromising user digital authentication, eventually, putting users’ accounts at risk. The research continued by carrying out a comparison between the United Kingdom (UK) and the Gulf Cooperation Council (GCC) countries in terms of attitudes and behaviour towards information sharing. It was evident that there is a significant difference between GCC Arab culture and the UK culture in terms of information sharing. Respondents from the GCC countries were more inclined to share sensitive information with their families and friends than the UK respondents were. However, UK respondents still revealed behaviour in some contexts, which may lead potential threats to the authentication mechanism and consequently to other digital accounts that require a credential pass.
It was shown that the lack of awareness and the cultural impact are the main issues for sensitive information sharing among family members and friends in the GCC. The research hence investigated channels and measures of reducing the prevalence of social engineering attacks, such as legislative measures, technological measures, and education and awareness. The found out that cultural change is necessary to remedy sensitive information sharing as a cultural trait. Education and awareness are perhaps the best defence to cultural change and should be designed effectively. Accordingly, the work critically analysed three national cybersecurity strategies of the United Kingdom (UK), the United States (U.S.) and Australia (AUS) in order to identify any information security awareness education designed to educate online users about the risk of sharing sensitive information including passwords. The analysis aimed to assess possible adoption of certain elements, if any, of these strategies by the UAE. The strategies discussed only user awareness to reduce information sharing. However, awareness in itself may not achieve the required result of reducing information sharing among family members and friends. Rather, computer users should be educated about the risks of such behaviour in order to realise and change. As a result, the research conducted an intervention study that proposed a UAE-focused strategy designed to promote information security education for the younger generation to mitigate the risk of sensitive information sharing. The results obtained from the intervention study of school children formed a basis for the information security education framework also proposed in this work
Combining SOA and BPM Technologies for Cross-System Process Automation
This paper summarizes the results of an industry case study that introduced a cross-system business process automation solution based on a combination of SOA and BPM standard technologies (i.e., BPMN, BPEL, WSDL). Besides discussing major weaknesses of the existing, custom-built, solution and comparing them against experiences with the developed prototype, the paper presents a course of action for transforming the current solution into the proposed solution. This includes a general approach, consisting of four distinct steps, as well as specific action items that are to be performed for every step. The discussion also covers language and tool support and challenges arising from the transformation
Cyber Ethics 4.0 : Serving Humanity with Values
Cyber space influences all sectors of life and society: Artificial Intelligence, Robots,
Blockchain, Self-Driving Cars and Autonomous Weapons, Cyberbullying,
telemedicine and cyber health, new methods in food production, destruction and
conservation of the environment, Big Data as a new religion, the role of education
and citizens’ rights, the need for legal regulations and international conventions.
The 25 articles in this book cover the wide range of hot topics. Authors from many
countries and positions of international (UN) organisations look for solutions
from an ethical perspective. Cyber Ethics aims to provide orientation on what is
right and wrong, good and bad, related to the cyber space. The authors apply and
modify fundamental values and virtues to specific, new challenges arising from cyber
technology and cyber society.
The book serves as reading material for teachers, students, policy makers, politicians,
businesses, hospitals, NGOs and religious organisations alike. It is an invitation for
dialogue, debate and solution
Robotic Faces: Exploring Dynamical Patterns of Social Interaction between Humans and Robots
Thesis (Ph.D.) - Indiana University, Informatics, 2015The purpose of this dissertation is two-fold: 1) to develop an empirically-based design for an interactive robotic face, and 2) to understand how dynamical aspects of social interaction may be leveraged to design better interactive technologies and/or further our understanding of social cognition.
Understanding the role that dynamics plays in social cognition is a challenging problem. This is particularly true in studying cognition via human-robot interaction, which entails both the natural social cognition of the human and the “artificial intelligence” of the robot. Clearly, humans who are interacting with other humans (or even other mammals such as dogs) are cognizant of the social nature of the interaction – their behavior in those cases differs from that when interacting with inanimate objects such as tools. Humans (and many other animals) have some awareness of “social”, some sense of other agents. However, it is not clear how or why.
Social interaction patterns vary across culture, context, and individual characteristics of the human interactor. These factors are subsumed into the larger interaction system, influencing the unfolding of the system over time (i.e. the dynamics). The overarching question is whether we can figure out how to utilize factors that influence the dynamics of the social interaction in order to imbue our interactive technologies (robots, clinical AI, decision support systems, etc.) with some "awareness of social", and potentially create more natural interaction paradigms for those technologies.
In this work, we explore the above questions across a range of studies, including lab-based experiments, field observations, and placing autonomous, interactive robotic faces in public spaces. We also discuss future work, how this research relates to making sense of what a robot "sees", creating data-driven models of robot social behavior, and development of robotic face personalities
On the evolution of digital evidence: novel approaches for cyber investigation
2012-2013Nowadays Internet is the fulcrum of our world, and the World Wide Web is the key to
access it. We develop relationships on social networks and entrust sensitive documents to
online services. Desktop applications are being replaced by fully-fledged web-applications
that can be accessed from any devices. This is possible thanks to new web technologies that
are being introduced at a very fast pace. However, these advances come at a price. Today,
the web is the principal means used by cyber-criminals to perform attacks against people
and organizations. In a context where information is extremely dynamic and volatile, the
fight against cyber-crime is becoming more and more difficult.
This work is divided in two main parts, both aimed at fueling research against cybercrimes.
The first part is more focused on a forensic perspective and exposes serious limitations
of current investigation approaches when dealing with modern digital information.
In particular, it shows how it is possible to leverage common Internet services in order to
forge digital evidence, which can be exploited by a cyber-criminal to claim an alibi. Hereinafter,
a novel technique to track cyber-criminal activities on the Internet is proposed,
aimed at the acquisition and analysis of information from highly dynamic services such as
online social networks.
The second part is more concerned about the investigation of criminal activities on
the web. Aiming at raising awareness for upcoming threats, novel techniques for the
obfuscation of web-based attacks are presented. These attacks leverage the same cuttingedge
technology used nowadays to build pleasant and fully-featured web applications.
Finally, a comprehensive study of today’s top menaces on the web, namely exploit kits, is
presented. The result of this study has been the design of new techniques and tools that
can be employed by modern honeyclients to better identify and analyze these menaces in
the wild. [edited by author]XII n.s
- …