11,831 research outputs found

    Locational wireless and social media-based surveillance

    Get PDF
    The number of smartphones and tablets as well as the volume of traffic generated by these devices has been growing constantly over the past decade and this growth is predicted to continue at an increasing rate over the next five years. Numerous native features built into contemporary smart devices enable highly accurate digital fingerprinting techniques. Furthermore, software developers have been taking advantage of locational capabilities of these devices by building applications and social media services that enable convenient sharing of information tied to geographical locations. Mass online sharing resulted in a large volume of locational and personal data being publicly available for extraction. A number of researchers have used this opportunity to design and build tools for a variety of uses – both respectable and nefarious. Furthermore, due to the peculiarities of the IEEE 802.11 specification, wireless-enabled smart devices disclose a number of attributes, which can be observed via passive monitoring. These attributes coupled with the information that can be extracted using social media APIs present an opportunity for research into locational surveillance, device fingerprinting and device user identification techniques. This paper presents an in-progress research study and details the findings to date

    AndroShield:automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach

    Get PDF
    The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications. This is due to what is called the “rush to release” as defined by Ponemon Institute. Security testing—which is considered one of the main phases of the development life cycle—is either not performed or given minimal time; hence, there is a need for security testing automation. One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. Fixing those leaks results in protecting smart-phones and tablet mobile device users against attacks. This paper focuses on building a hybrid approach of static and dynamic analysis for detecting the vulnerabilities of Android applications. This approach is capsuled in a usable platform (web application) to make it easy to use for both public users and professional developers. Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. Dynamic analysis, on the other hand, detects the vulnerabilities that are dependent on the run-time behaviour of the application and cannot be detected using static analysis. The model is evaluated against different applications with different security vulnerabilities. Compared with other detection platforms, our model detects information leaks as well as insecure network requests alongside other commonly detected flaws that harm users’ privacy. The code is available through a GitHub repository for public contribution

    Does Tax Competition Tame the Leviathan?

    Get PDF
    We study the impact of tax competition on equilibrium taxes and welfare, focusing on the jurisdictional fragmentation of federations. In a representative-agent model of fiscal federalism, fragmentation among jurisdictions with benevolent tax-setting authorities unambiguously reduces welfare. If, however, tax-setting authorities pursue revenue maximization, fragmentation, by pushing down equilibrium tax rates, may under certain conditions increase citizen welfare. We exploit the highly decentralized and heterogeneous Swiss fiscal system as a laboratory for the estimation of these effects. While for purely direct-democratic jurisdictions (which we associate with benevolent tax setting) we find that tax rates increase in fragmentation, fragmentation has a moderating effect on the tax rates of jurisdictions with some degree of delegated government. Our results thereby support the view that tax competition can be second-best welfare enhancing by constraining the scope for public-sector revenue maximization.tax competition; optimal taxation; government preferences; fiscal federalism; direct democracy

    Security Evaluation of Cyber-Physical Systems in Society- Critical Internet of Things

    Get PDF
    In this paper, we present evaluation of security awareness of developers and users of cyber-physical systems. Our study includes interviews, workshops, surveys and one practical evaluation. We conducted 15 interviews and conducted survey with 55 respondents coming primarily from industry. Furthermore, we performed practical evaluation of current state of practice for a society-critical application, a commercial vehicle, and reconfirmed our findings discussing an attack vector for an off-line societycritical facility. More work is necessary to increase usage of security strategies, available methods, processes and standards. The security information, currently often insufficient, should be provided in the user manuals of products and services to protect system users. We confirmed it lately when we conducted an additional survey of users, with users feeling as left out in their quest for own security and privacy. Finally, hardware-related security questions begin to come up on the agenda, with a general increase of interest and awareness of hardware contribution to the overall cyber-physical security. At the end of this paper we discuss possible countermeasures for dealing with threats in infrastructures, highlighting the role of authorities in this quest

    Does \u2018bigger\u2019mean \u2018better\u2019? Pitfalls and shortcuts associated with big data for social research

    Get PDF
    \u2018Big data is here to stay.\u2019 This key statement has a double value: is an assumption as well as the reason why a theoretical reflection is needed. Furthermore, Big data is something that is gaining visibility and success in social sciences even, overcoming the division between humanities and computer sciences. In this contribution some considerations on the presence and the certain persistence of Big data as a socio-technical assemblage will be outlined. Therefore, the intriguing opportunities for social research linked to such interaction between practices and technological development will be developed. However, despite a promissory rhetoric, fostered by several scholars since the birth of Big data as a labelled concept, some risks are just around the corner. The claims for the methodological power of bigger and bigger datasets, as well as increasing speed in analysis and data collection, are creating a real hype in social research. Peculiar attention is needed in order to avoid some pitfalls. These risks will be analysed for what concerns the validity of the research results \u2018obtained through Big data. After a pars distruens, this contribution will conclude with a pars construens; assuming the previous critiques, a mixed methods research design approach will be described as a general proposal with the objective of stimulating a debate on the integration of Big data in complex research projecting

    Economic Growth and Tax-Competing Leviathans

    Get PDF
    Is tax competition good for economic growth? The paper addresses this question by means of a simple model of economic growth in which a wasteful Leviathan state sets taxes and provides productive input. Wasteful behaviour is restricted by the voter, who reduces political support if her income is reduced. The intensity of tax competition is modelled via variation of a parameter measuring the mobility of the tax base. It is shown that the effects of increased mobility of the tax base on economic growth are ambiguous and that the elasticity of intertemporal substitution, which in this model equals the rate of intratemporal substitution between the government's own consumption and its political support, is a decisive variable in this context.

    Literature review on the dynamics of social movements in fragile and conflict-affected states

    Get PDF
    This literature review assesses the available academic and policy-oriented literature on social movements in fragile and conflict-affected contexts. It examines who becomes involved in collective action and why, the barriers to mobilisation and, where social movements do emerge, how these are able to sustain mobilisation and broaden their membership base to reflect the interests of the wider community. Evidence from this review suggests the importance of considering the interplay of movement activity and state stability, and of taking into account existing state-society relationships. Donors could focus on creating a supportive environment for social movements
    corecore