4 research outputs found
Application of the Benford’s law to Social bots and Information Operations activities
Benford\u27s law shows the pattern of behavior in normal systems. It states that in natural systems digits\u27 frequency have a certain pattern such that the occurrence of first digits in numbers are unevenly distributed. In systems with natural behavior, numbers begin with a “1” are more common than numbers beginning with “9”. It implies that if the distribution of first digits deviate from the expected distribution, it is indicative of fraud. It has many applications in forensic accounting, stock markets, finding abnormal data in survey data, and natural science. We investigate whether social media bots and Information Operations activities are conformant to the Benford\u27s law. Our results showed that bots\u27 behavior adhere to Benford\u27s law, suggesting that using this law helps in detecting malicious online automated accounts and their activities on social media. However, activities related to Information Operations did not show consistency in regards to Benford\u27s law. Our findings shedlight on the importance of examining regular and anomalous online behavior to avoid malicious and contaminated content on social media
Advanced analytical methods for fraud detection: a systematic literature review
The developments of the digital era demand new ways of producing goods and rendering
services. This fast-paced evolution in the companies implies a new approach from the
auditors, who must keep up with the constant transformation. With the dynamic
dimensions of data, it is important to seize the opportunity to add value to the companies.
The need to apply more robust methods to detect fraud is evident.
In this thesis the use of advanced analytical methods for fraud detection will be
investigated, through the analysis of the existent literature on this topic.
Both a systematic review of the literature and a bibliometric approach will be applied to
the most appropriate database to measure the scientific production and current trends.
This study intends to contribute to the academic research that have been conducted, in
order to centralize the existing information on this topic
Assessment of Security Threats on IoT Based Applications: Cyber Security Case Study in Cloud-Based IoT Environment Using the Example of Developing Cloud Information Security Technology in Banking
The main objective of this master’s thesis is to emphasise on internet cyber security viewpoint on the appliances and the environment of the internet of things (IoT). In recent studies, there has been an exponential rise in the number of IoT devices and the usage rate of these devices is frequent because they are used in everyday life. Hence, the need to secure these IoT devices is becoming more and more crucial. The specified research methodology was sub-divided into two main parts. The first part of the research was about investigating and studying the environment and the IoT architectural viewpoint. Also, what is currently available in the market, the different types of IoT appliances commonly utilised, and their purpose. This part also clearly emphasises the basic rules used to protect devices in such an environment against the most common forms of cyber-attacks.
Study Design. The study adopted a mixed-method research design utilising case study and pragmatic philosophical reasoning, the exploratory approach was deemed appropriate because it enabled the research to be conducted by emphasising various aspects of the case under review. The study found out that the common vulnerabilities on IoT are malware, outdated software, weak passwords, storing data in clear texts. The vulnerabilities are exploited by cyber attackers to cause a denial of service and other forms of attacks that have caused millions of losses in the banking industry. Improved technology has also lead to increased cyber security risks in the banking industry. Therefore, the banking industry needs to take much care in regards to this and prevent cyber-attack directed to them as high as possible by being on guard always. To overcome the vulnerabilities counter measures must be put in place. Some of the counter measures are regular software updates, installation, and constant checks using antiviruses. Developing automated patching software to mitigate the vulnerabilities
The Effects of Deepfakes and Synthetic Media on Communication Professionals
The spread of misinformation and disinformation is regarded as one of the most salient challenges for communication professionals around the world.
Now, a new technology called DeepFakes or “Synthetic Media” has the potential to further uproot the infosphere. Artificial Intelligence (AI) will enable the mass creation of synthetic audio-visual content that resembles real videos, in which people will appear to say or do things they never actually said or did.
The existing literature predominantly focuses on three aspects of DeepFakes and Synthetic Media: the technical background, coverage of preexisting DeepFakes and possible solutions to combat the malicious use of the technology. This research study specifically explored whether communication professionals are adequately prepared for this new phenomenon, as it is likely to increase uncertainty, erode public trust and create a myriad of liabilities, in terms of crisis and reputation management.
Data was gathered through a survey and interviews with communication professionals, as well as interviews with technology and policy experts. The analysis of the data confirmed my hypotheses that communication professionals are not adequately prepared for the challenge of DeepFakes and Synthetic Media, both in terms of digital literacy and communication strategy. The study further highlighted an alignment gap between communication professionals and experts, as it pertains to combating the malicious use of the technology, as well as embracing potentially positive applications. The study recommends integrating information on DeepFakes and Synthetic Media into education curricula for communicators. Expert data suggested that the challenge of the new technology is too complex to be handled by communication and information technology (IT) departments of individual companies. It is, therefore, important for companies to connect with specialists and consultants that can tie into large-scale efforts by governments, university researchers and large tech platforms to combat the spread and malicious use of DeepFakes and Synthetic Media.
By taking steps to alleviate insecurity and fear around the issue, communication departments could feel more empowered to embrace positive applications of DeepFakes and Synthetic Media, while, at the same time, having tools and strategies at their disposal to combat their malicious use