5,076 research outputs found

    Investigating Deception in Cyberspace

    Get PDF

    A review of research ethics in internet-based research

    Get PDF
    Internet-based research methods can include; on-line surveys, web page content analysis, videoconferencing for on-line focus groups and/ or interviews, analysis of ‘e’ conversations through social networking sites, email, chat rooms, discussion boards and/ or blogs. Over the last ten years an upsurge in Internet Based Research (IBR) has led to increased interest in IBR and research ethics. Here we present some ethical guidelines for IBR whilst at the same time accepting that it would be unrealistic to expect that any single set of guidelines can cover all ethical situations concerning IBR). There is simply too much diversity across internet cultures, values and modes of operation for that to be the case. Perhaps the most useful solution to the complex challenges of IRB lies with a form of ‘negotiated ethics’, a situated approach grounded in the specifics of the online community, the methodology and the research question(s). This does not mean an ‘anything goes’ relativist approach, rather an open, pluralistic policy in relation to IBR ethical issues (Ess, 2009; AoIR, 2002)

    Trolling in asynchronous computer-mediated communication: From user discussions to academic definitions

    Get PDF
    Whilst computer-mediated communication (CMC) can benefit users by providing quick and easy communication between those separated by time and space, it can also provide varying degrees of anonymity that may encourage a sense of impunity and freedom from being held accountable for inappropriate online behaviour. As such, CMC is a fertile ground for studying impoliteness, whether it occurs in response to perceived threat (flaming), or as an end in its own right (trolling). Currently, first and secondorder definitions of terms such as im/politeness (Brown and Levinson 1987; Bousfield 2008; Culpeper 2008; Terkourafi 2008), in-civility (Lakoff 2005), rudeness (Beebe 1995, Kienpointner 1997, 2008), and etiquette (Coulmas 1992), are subject to much discussion and debate, yet the CMC phenomenon of trolling is not adequately captured by any of these terms. Following Bousfield (in press), Culpeper (2010) and others, this paper suggests that a definition of trolling should be informed first and foremost by user discussions. Taking examples from a 172-million-word, asynchronous CMC corpus, four interrelated conditions of aggression, deception, disruption, and success are discussed. Finally, a working definition of trolling is presented

    Notes From the New World: The Future of the Internet, Editors\u27 Foreword

    Get PDF

    An In-Depth Look into Cybercrime

    Get PDF
    Cybercrime is an increasing area of study in the field of criminology. With the advancement of technology and the growing use of social media, people are connected all over the world more than they have ever been before. It is not the invention of new crimes but technology has allowed old crimes to be committed through a new medium. This paper explores the realm of cyberspace and how old crimes are being committed in new ways by different countries and people

    Optimal Timing in Dynamic and Robust Attacker Engagement During Advanced Persistent Threats

    Full text link
    Advanced persistent threats (APTs) are stealthy attacks which make use of social engineering and deception to give adversaries insider access to networked systems. Against APTs, active defense technologies aim to create and exploit information asymmetry for defenders. In this paper, we study a scenario in which a powerful defender uses honeynets for active defense in order to observe an attacker who has penetrated the network. Rather than immediately eject the attacker, the defender may elect to gather information. We introduce an undiscounted, infinite-horizon Markov decision process on a continuous state space in order to model the defender's problem. We find a threshold of information that the defender should gather about the attacker before ejecting him. Then we study the robustness of this policy using a Stackelberg game. Finally, we simulate the policy for a conceptual network. Our results provide a quantitative foundation for studying optimal timing for attacker engagement in network defense.Comment: Submitted to the 2019 Intl. Symp. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Nets. (WiOpt

    CORRUPTION, FRAUD AND INTERNAL CONTROL

    Get PDF
    The economic crunch created a specific context for activity and profitability failing. The corruption is more and more common in our days. In the same time, the amount of money lost by businesses and the public sector to larger frauds increased last year to unthinkable limits. The shareholders expect the directors to take care to protect their company’s assets. This is why the financial controller has a very important role in each organization. The techniques to detect corruption or a fraud are developing every year. Thus, the introduction of computerized accounting has created the opportunities to conduct very comprehensive tests at relatively little cost. However, the fraudsters became more and more clever, and the controllers are responsible for the prevention and detection of fraud. The procedures that controllers should adopt with regard to fraud depend on the risk that fraud could occur and remain undetected and also the risk of that fraud impairing the truth and fairness of the statement.corruption; fraud; internal control; internal audit; business fraud
    • 

    corecore