3,368 research outputs found

    Cybercrime Pervasiveness, Consequences, and Sustainable Counter Strategies

    Get PDF
    As our connectivity and dependency on technology increases, so does our vulnerability. Technology has provided not only new tools, but also new opportunities for criminals in the digital world. The abuse of new technologies has been threatening economic and Jinancial security and actually devastating the lives of affected indivicluals. In Nigeria, cybercrime has recorded mostly foregin-based individuals and organizations as victims thereby getting Nigeria ranked among the nations with notorious pemasiveness of high-tech crimes. Indeed, adequately formulating a strategy to contain the menace of cybercrime presents aformidable challenge to law enforcement. This paper x-rays noted instances of cybercrime pervasiveness, its devastating consequences, and up-to-date countermeasures in Nigeria It develops an enforceable/sustainable framework to determine how critical infrastructures are put at risk snd how law enforcement should react in responding to the threats

    Seminar Users in the Arabic Twitter Sphere

    Full text link
    We introduce the notion of "seminar users", who are social media users engaged in propaganda in support of a political entity. We develop a framework that can identify such users with 84.4% precision and 76.1% recall. While our dataset is from the Arab region, omitting language-specific features has only a minor impact on classification performance, and thus, our approach could work for detecting seminar users in other parts of the world and in other languages. We further explored a controversial political topic to observe the prevalence and potential potency of such users. In our case study, we found that 25% of the users engaged in the topic are in fact seminar users and their tweets make nearly a third of the on-topic tweets. Moreover, they are often successful in affecting mainstream discourse with coordinated hashtag campaigns.Comment: to appear in SocInfo 201

    Fighting Spam. How Stringent is the Canadian Legal Arsenal. An Analysis in the Light of the U.S. CAN-SPAM Act

    Get PDF
    Following several countries, Canada recently passed Canada’s Anti-Spam Legislation (CASL), in an attempt to tackle spam. The law aims to ‘‘protect Canadians while ensuring that businesses can continue to compete in the global marketplace”. For this purpose, CASL prohibits not only the sending of commercial electronic messages without consent, but also any alteration of transmission data in the course of a commercial activity. Moreover, the Act disallows the installation of a computer program on another person’s computer system and the sending of commercial electronic messages following the installation. These three activities are prohibited unless the author or initiator has obtained the recipient’s prior consent, either express or implied. This opt-in approach contrasts with the U.S. CAN- SPAM Acts opt-out regime, in force since 2004, which is known to offer to senders the chance to initiate contact and to recipients the option to unsubscribe or reject any subsequent commercial electronic message. Our paper intends to demonstrate that, notwithstanding the apparent difference in their respective approach, CASL and U.S. CAN-SPAM Act remain fundamentally similar in practical effect. This resemblance is good news, considering the profile and proximity of Canadian and American e-commerce economies. Thus, in spite of its detail and complexity, CASL may not be the most stringent anti-spam act as claimed, certainly not with the challenges related to its implementation and enforcement
    corecore