4 research outputs found

    Application of the Benford’s law to Social bots and Information Operations activities

    Get PDF
    Benford\u27s law shows the pattern of behavior in normal systems. It states that in natural systems digits\u27 frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are conformant to the Benford\u27s law. Our results showed that bots\u27 behavior adhere to Benford\u27s law, suggesting that using this law helps in detecting malicious online automated accounts and their activities on social media. However, activities related to Information Operations did not show consistency in regards to Benford\u27s law. Our findings shedlight on the importance of examining regular and anomalous online behavior to avoid malicious and contaminated content on social media

    Advanced analytical methods for fraud detection: a systematic literature review

    Get PDF
    The developments of the digital era demand new ways of producing goods and rendering services. This fast-paced evolution in the companies implies a new approach from the auditors, who must keep up with the constant transformation. With the dynamic dimensions of data, it is important to seize the opportunity to add value to the companies. The need to apply more robust methods to detect fraud is evident. In this thesis the use of advanced analytical methods for fraud detection will be investigated, through the analysis of the existent literature on this topic. Both a systematic review of the literature and a bibliometric approach will be applied to the most appropriate database to measure the scientific production and current trends. This study intends to contribute to the academic research that have been conducted, in order to centralize the existing information on this topic

    Assessment of Security Threats on IoT Based Applications: Cyber Security Case Study in Cloud-Based IoT Environment Using the Example of Developing Cloud Information Security Technology in Banking

    Get PDF
    The main objective of this master’s thesis is to emphasise on internet cyber security viewpoint on the appliances and the environment of the internet of things (IoT). In recent studies, there has been an exponential rise in the number of IoT devices and the usage rate of these devices is frequent because they are used in everyday life. Hence, the need to secure these IoT devices is becoming more and more crucial. The specified research methodology was sub-divided into two main parts. The first part of the research was about investigating and studying the environment and the IoT architectural viewpoint. Also, what is currently available in the market, the different types of IoT appliances commonly utilised, and their purpose. This part also clearly emphasises the basic rules used to protect devices in such an environment against the most common forms of cyber-attacks. Study Design. The study adopted a mixed-method research design utilising case study and pragmatic philosophical reasoning, the exploratory approach was deemed appropriate because it enabled the research to be conducted by emphasising various aspects of the case under review. The study found out that the common vulnerabilities on IoT are malware, outdated software, weak passwords, storing data in clear texts. The vulnerabilities are exploited by cyber attackers to cause a denial of service and other forms of attacks that have caused millions of losses in the banking industry. Improved technology has also lead to increased cyber security risks in the banking industry. Therefore, the banking industry needs to take much care in regards to this and prevent cyber-attack directed to them as high as possible by being on guard always. To overcome the vulnerabilities counter measures must be put in place. Some of the counter measures are regular software updates, installation, and constant checks using antiviruses. Developing automated patching software to mitigate the vulnerabilities

    The Effects of Deepfakes and Synthetic Media on Communication Professionals

    Full text link
    The spread of misinformation and disinformation is regarded as one of the most salient challenges for communication professionals around the world. Now, a new technology called DeepFakes or “Synthetic Media” has the potential to further uproot the infosphere. Artificial Intelligence (AI) will enable the mass creation of synthetic audio-visual content that resembles real videos, in which people will appear to say or do things they never actually said or did. The existing literature predominantly focuses on three aspects of DeepFakes and Synthetic Media: the technical background, coverage of preexisting DeepFakes and possible solutions to combat the malicious use of the technology. This research study specifically explored whether communication professionals are adequately prepared for this new phenomenon, as it is likely to increase uncertainty, erode public trust and create a myriad of liabilities, in terms of crisis and reputation management. Data was gathered through a survey and interviews with communication professionals, as well as interviews with technology and policy experts. The analysis of the data confirmed my hypotheses that communication professionals are not adequately prepared for the challenge of DeepFakes and Synthetic Media, both in terms of digital literacy and communication strategy. The study further highlighted an alignment gap between communication professionals and experts, as it pertains to combating the malicious use of the technology, as well as embracing potentially positive applications. The study recommends integrating information on DeepFakes and Synthetic Media into education curricula for communicators. Expert data suggested that the challenge of the new technology is too complex to be handled by communication and information technology (IT) departments of individual companies. It is, therefore, important for companies to connect with specialists and consultants that can tie into large-scale efforts by governments, university researchers and large tech platforms to combat the spread and malicious use of DeepFakes and Synthetic Media. By taking steps to alleviate insecurity and fear around the issue, communication departments could feel more empowered to embrace positive applications of DeepFakes and Synthetic Media, while, at the same time, having tools and strategies at their disposal to combat their malicious use
    corecore