5,005 research outputs found

    Alter ego, state of the art on user profiling: an overview of the most relevant organisational and behavioural aspects regarding User Profiling.

    Get PDF
    This report gives an overview of the most relevant organisational and\ud behavioural aspects regarding user profiling. It discusses not only the\ud most important aims of user profiling from both an organisation’s as\ud well as a user’s perspective, it will also discuss organisational motives\ud and barriers for user profiling and the most important conditions for\ud the success of user profiling. Finally recommendations are made and\ud suggestions for further research are given

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    INTEGRATION OF INTELLIGENCE TECHNIQUES ON THE EXECUTION OF PENETRATION TESTS (iPENTEST)

    Get PDF
    Penetration Tests (Pentests) identify potential vulnerabilities in the security of computer systems via security assessment. However, it should also benefit from widely recognized methodologies and recommendations within this field, as the Penetration Testing Execution Standard (PTES). The objective of this research is to explore PTES, particularly the three initial phases: 1. Pre-Engagement Interactions; 2. Intelligence Gathering; 3. Threat Modeling; and ultimately to apply Intelligence techniques to the Threat Modeling phase. To achieve this, we will use open-source and/or commercial tools to structure a process to clarify how the results were reached using the research inductive methodology. The following steps were implemented: i) critical review of the “Penetration Testing Execution Standard (PTES)”; ii) critical review of Intelligence Production Process; iii) specification and classification of contexts in which Intelligence could be applied; iv) definition of a methodology to apply Intelligence Techniques to the specified contexts; v) application and evaluation of the proposed methodology to real case study as proof of concept. This research has the ambition to develop a model grounded on Intelligence techniques to be applied on PTES Threat Modeling phase

    World Trends in Freedom of Expression and Media Development: 2017/2018 Global Report

    Get PDF
    Abstract: Please refer to full text to view abstrac

    Elections in digital times: a guide for electoral practitioners

    Get PDF
    Strengthening democracy and electoral processes in the era of social media and Artificial Intelligence Democracy requires free, periodic, transparent, and inclusive elections. Freedom of expression, freedom of the press, and the right to political participation are also critical to societies ruled by the respect of human rights. In today’s rapidly evolving digital environment, opportunities for communication between citizens, politicians and political parties are unprecedented –– with information related to elections flowing faster and easier than ever, coupled with expanded opportunities for its verification and correction by a growing number of stakeholders. However, with billions of human beings connected, and disinformation and misinformation circulating unhinged around the networks, democratic processes and access to reliable information are at risk. With an estimated 56.8% of the world’s population active on social media and an estimate of 4 billion eligible voters, the ubiquity of social networks and the impact of Artificial Intelligence can intentionally or unintentionally undermine electoral processes, thereby delegitimizing democracies worldwide. In this context, all actors involved in electoral processes have an essential role to play. Electoral management bodies, electoral practitioners, the media, voters, political parties, and civil society organizations must understand the scope and impact of social media and Artificial Intelligence in the electoral cycle. They also need to have access to the tools to identify who instigates and spreads disinformation and misinformation, and the tools and strategies to combat it. This handbook aims to be a toolbox that helps better understand the current scenario and share experiences of good practices in different electoral settings and equip electoral practitioners and other key actors from all over the world to ensure the credibility of the democratic system in times of profound transformations

    Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

    Get PDF
    The rapid growth of the Internet interconnectivity and complexity of communication systems has led us to a significant growth of cyberattacks globally often with severe and disastrous consequences. The swift development of more innovative and effective (cyber)security solutions and approaches are vital which can detect, mitigate and prevent from these serious consequences. Cybersecurity is gaining momentum and is scaling up in very many areas. This book builds on the experience of the Cyber-Trust EU project’s methods, use cases, technology development, testing and validation and extends into a broader science, lead IT industry market and applied research with practical cases. It offers new perspectives on advanced (cyber) security innovation (eco) systems covering key different perspectives. The book provides insights on new security technologies and methods for advanced cyber threat intelligence, detection and mitigation. We cover topics such as cyber-security and AI, cyber-threat intelligence, digital forensics, moving target defense, intrusion detection systems, post-quantum security, privacy and data protection, security visualization, smart contracts security, software security, blockchain, security architectures, system and data integrity, trust management systems, distributed systems security, dynamic risk management, privacy and ethics

    External Evaluation of Mobile Phone Tchnology-based Nutrition and Agriculture Advisory Services in Africa: Final Ghana Mixed Methods Evaluation Report

    Get PDF
    e-PactThis final mixed methods report forms part of the external impact evaluation of mNutrition in Ghana. The evaluation was conducted by a consortium of researchers from Gamos, the Institute of Development Studies (IDS) and the International Food Policy Research Institute (IFPRI) between 2016 and 2020. Mnutrition was a global initiative supported by DFID, organised by GSMA, and implemented by in-country mobile network operators (MNOs) and other providers to use mobile technology to improve the health and nutritional status of children and adults in low-income countries. In Ghana, mNutrition was added to the existing m-Agriculture platform Vodafone Farmers’ Club, a service that offered agricultural information via SMS (short message service) and recorded voice messages, access to an expert helpline and free calls to other Farmers’ Club members. This report summarises the final findings of the mNutrition evaluation in Ghana drawn from across the three interlinked evaluation components (quantitative, qualitative and business model) and structured around the key overarching evaluation questions. For more details on the technical and methodological aspects of the evaluation please refer to the separate methods-specific technical reports
    corecore