52 research outputs found

    The Domination of the English Language in the Global Village: Efforts to Further Develop the Internet By Populating It With Non-Latin-Based Languages

    Get PDF
    At the top of the homepage of the Internet Corporation for Assigned Names and Numbers (ICANN) is a choice of nine different languages in which to read information about the organization; four of them are languages written in non-Latin script (Arabic, Chinese, Japanese and Russian). Clicking upon any of the language options brings the reader to a new website in that language and, presuming the reader has a computer and screen that can handle non-Latin script, the webpage reads legibly and clearly. The Uniform Resource Locator (URL), however, still reads in Latin script despite the webpage’s content being in a foreign script. This article will examine the current state of affairs in policy-oriented Internet realms and suggest that the cohesive development of Internationalized Domain Names (IDNs), which are domain names in character sets other than American Standard Code for Information Interchange (ASCII), is a critical step to take in order to more fully utilize the potential the Internet offers for international communication

    Linguistic Diversity on the Internet: Arabic, Chinese and Cyrillic Script Top-Level Domain Names

    Get PDF
    The deployment of Arabic, Chinese, and Cyrillic top-level domain names is explored in this research by analyzing technical and policy documents of the Internet Corporation for Assigned Names and Numbers (ICANN), as well as newspaper articles in the respective language regions. The tension between English uniformity at the root level of the Internet׳s domain names system, and language diversity in the global Internet community, has resulted in various technological solutions surrounding Arabic, Chinese, and Cyrillic language domain names. These standards and technological solutions ensure the security and stability of the Internet; however, they do not comprehensively address the linguistic diversity needs of the Internet. ICANN has been transforming into an international policy organization, yet its linguistic diversity policies appear disconnected from the diversity policies of the United Nations, and remain technically oriented. Linguistic diversity in relation to IDNs at this stage mostly focus on the language representation of major languages that are spoken in powerful nation-states, who use the rhetoric of national pride, local business branding, and inclusion of non-English speakers. This situation surfaces the tension between nation-states and the new international governing institution ICANN

    ミャンマー語テキストの形式手法による音節分割、正規化と辞書順排列

    Get PDF
    国立大学法人長岡技術科学大

    Revision 2 Summary

    Get PDF
    Versio

    The 2017 homograph browser attack mitigation survey

    Get PDF
    Since their inception, International Domain Names (IDN) have allowed for non-Latin characters to be entered into domain names. This feature has led to attackers forging malicious domains which appear identical to the Latin counterpart. This is achieved through using non-Latin characters which appear identical to their Latin counterpart. This attack is referred to as a Homograph attack. This research continues the work of Hannay and Bolan (2009), and Hannay and Baatard (2012), which assessed the mitigation methods incorporated by web browsers in mitigating IDN homograph attacks. Since these works, time IDN mitigation algorithms have been altered, such as the one used in Mozilla Firefox (Gerv, 2017). This study evaluates browser homograph attack mitigation strategies in browsers released post-2011. In this study, we find a high level of effective multi-script mitigation across the browser families surveyed. Notable exceptions to this include a single version of Firefox in which the mitigation features were not present and ongoing omission of mitigation against single script attacks

    Trademark Vigilance in the Twenty-First Century: An Update

    Get PDF
    The trademark laws impose a duty upon brand owners to be vigilant in policing their marks, lest they be subject to the defense of laches, a reduced scope of protection, or even death by genericide. Before the millennium, it was relatively manageable for brand owners to police the retail marketplace for infringements and counterfeits. The Internet changed everything. In ways unforeseen, the Internet has unleashed a tremendously damaging cataclysm upon brands—online counterfeiting. It has created a virtual pipeline directly from factories in China to the American consumer shopping from home or work. The very online platforms that make Internet shopping so convenient, and that have enabled brands to expand their sales, have exposed buyers to unwittingly purchasing fake goods which can jeopardize their health and safety as well as brand reputation. This Article updates a 1999 panel discussion titled Trademark Vigilance in the Twenty-First Century, held at Fordham Law School, and explains all the ways in which vigilance has changed since the Internet has become an inescapable feature of everyday life. It provides trademark owners with a road map for monitoring brand abuse online and solutions for taking action against infringers, counterfeiters and others who threaten to undermine brand value

    The Domain Name System—Past, Present, and Future

    Get PDF
    The Domain Name System (DNS) is a critical component of the global Internet infrastructure. Throughout its history, its design and administration has experienced significant dynamic changes as the Internet itself has evolved. The history of the DNS is divided into six eras, based on underlying technological and administrative themes within each era. Developments in its governance, its application, and in other factors are discussed. Future directions for DNS use and abuse are explored, along with challenges in its future governance. Finally, a proposed research model is included to guide future study of the DNS evolution and its influences from political, legal, psychological, sociological, and technological perspectives

    Why Johnny can’t rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks?

    Get PDF
    Phishing is a way of stealing people’s sensitive information such as username, password and banking details by disguising as a legitimate entity (i.e. email, website). Anti-phishing education considered to be vital in strengthening “human”, the weakest link in information security. Previous research in anti-phishing education focuses on improving educational interventions to better interact the end user. However, one can argue that existing anti-phishing educational interventions are limited in success due to their outdated teaching content incorporated. Furthermore, teaching outdated anti-phishing techniques might not help combat contemporary phishing attacks. Therefore, this research focuses on investigating the obfuscation techniques of phishing URLs used in anti-phishing education against the contemporary phishing attacks reported in PhishTank.com. Our results showed that URL obfuscation with IP address has become insignificant and it revealed two emerging URL obfuscation techniques, that attackers use lately, haven’t been incorporated into existing anti-phishing educational interventions

    Beyond the Digital Divide: Language Factors, Resource Wealth, and Post-Communism in Mongolia

    Get PDF
    This chapter explores the interplay between society and Internet technology in the context of the developing former socialist country of Mongolia. This chapter goes beyond questions of access to the Internet and explores three factors of the global digital divide. First, this chapter explores how language factors such as non-Roman domain names and the use of the Cyrillic alphabet exacerbate the digital divide in the impoverished country of Mongolia. ICANN’s initiation of international domain names is an initial development toward achieving linguistic diversity on the Internet. Second, this chapter explores how post-communist settings and foreign investment and aid dependency afflict Internet development. A rapid economic growth in Mongolia has increased access to mobile phones, computers, and the Internet; however, the influx of foreign capital poured into the mining, construction, and telecommunication sectors frequently comes in non-concessional terms raising concerns over the public debt in Mongolia
    corecore