296,610 research outputs found

    Engaging through social media. Part 1 social media explained

    Get PDF
    This guide is designed for youth project managers, and has the following aims "To explain social media technologies and functions using simple language. To provide you with the tools to increase interest and attendance at your project by working with young people and promoting your activities through social media.

    How Do Tor Users Interact With Onion Services?

    Full text link
    Onion services are anonymous network services that are exposed over the Tor network. In contrast to conventional Internet services, onion services are private, generally not indexed by search engines, and use self-certifying domain names that are long and difficult for humans to read. In this paper, we study how people perceive, understand, and use onion services based on data from 17 semi-structured interviews and an online survey of 517 users. We find that users have an incomplete mental model of onion services, use these services for anonymity and have varying trust in onion services in general. Users also have difficulty discovering and tracking onion sites and authenticating them. Finally, users want technical improvements to onion services and better information on how to use them. Our findings suggest various improvements for the security and usability of Tor onion services, including ways to automatically detect phishing of onion services, more clear security indicators, and ways to manage onion domain names that are difficult to remember.Comment: Appeared in USENIX Security Symposium 201

    Teens, Kindness and Cruelty on Social Network Sites

    Get PDF
    Analyzes survey findings about how teenagers navigate the world of "digital citizenship," including experiences of, reactions to, and sources of advice about online cruelty; privacy controls and practices; and levels of parental regulation

    A Risk Management Process for Consumers

    Get PDF
    Simply by using information technology, consumers expose themselves to considerable security risks. Because no technical or legal solutions are readily available, the only remedy is to develop a risk management process for consumers, similar to the process executed by enterprises. Consumers need to consider the risks in a structured way, and take action, not once, but iteratively. Such a process is feasible: enterprises already execute such processes, and time-saving tools can support the consumer in her own process. In fact, given our society's emphasis on individual responsibilities, skills and devices, a risk management process for consumers is the logical next step in improving information security

    Cyberbullying : supporting school staff

    Get PDF

    Social Media’s Effect on Mental Health: How America’s Youth are More Vulnerable to its Negative Implications

    Get PDF
    This article explores the potentially negative psychological effects social media photo-sharing platforms have on America’s adolescents. While most studies on mental health effects related to social media use have focused on Facebook and the young adult age group 18-35, this article focuses on users under the age of 18 with an emphasis on Instagram and Snapchat – the two most rapidly growing social networking sites for adolescents. Photo-sharing sites have characteristics different than other social media sites, specifically the ability to alter photos and to communicate live time through videos and photos, which may have different mental health consequences on younger populations. Through a review of previous academic research, and a survey administered to a sample population under the age of 18, this article analyzes how social comparisons, a need for external validation, and a fear of missing out and exclusion may affect adolescents more than older adults due to the fact that they are in a critical developmental period where self-esteem and self-worth can be particularly influenced by peers and social media. While some argue that social media, including photo-sharing sites, may allow adolescents more social contact, opportunities for self-esteem building, and a chance for those who are shy or with low self-esteem to experiment in a safer environment than face to face contact, this article shows that the opposite is also true: that excessive use of photo-sharing sites may lead to negative mental health consequences due to social comparisons, a fear of missing out, and an unhealthy desire to attain external validation from peers. The article also suggests that adolescents with deceptive personalities, Machiavellian personalities, and high social desirability needs may be more vulnerable to some of the risks of social media use, and that identifying at-risk individuals may allow teachers, counselors, and parents to help them navigate their social media world during an influential time in their lives

    Facebook: The Newest Weight Loss Supplement?

    Get PDF
    This study sought to find a correlation between Facebook usage and exercise and diet habits among college-age females. A review of literature has shown the prevalence of eating disorders on college campuses and the pressures directly associated with these statistics. Eighty surveys were collected in order to measure both qualitative and quantitative data concerning the participants Facebook, eating, and dieting habits. Results revealed a strong drive among these females to stay thin through the use of diet and exercise habits, along with a correlation between viewing Facebook photos and the urge to workout. Further research on this subject should focus on the potential danger caused by extreme Facebook usage

    Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies

    Get PDF
    Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value. The problem of social engineering attack is that there is no single solution to eliminate it completely, since it deals largely with the human factor. This is why implementing empirical experiments is very crucial in order to study and to analyze all malicious and deceiving phishing website attack techniques and strategies. In this paper, three different kinds of phishing experiment case studies have been conducted to shed some light into social engineering attacks, such as phone phishing and phishing website attacks for designing effective countermeasures and analyzing the efficiency of performing security awareness about phishing threats. Results and reactions to our experiments show the importance of conducting phishing training awareness for all users and doubling our efforts in developing phishing prevention techniques. Results also suggest that traditional standard security phishing factor indicators are not always effective for detecting phishing websites, and alternative intelligent phishing detection approaches are needed

    The Fact-Checking Universe in Spring 2012: An Overview

    Get PDF
    By almost any measure, the 2012 presidential race is shaping up to be the most fact-checked electoral contest in American history. Every new debate and campaign ad yields a blizzard of fact-checking from the new full-time fact-checkers, from traditional news outlets in print and broadcast, and from partisan political organizations of various stripes. And though fact-checking still peaks before elections it is now a year-round enterprise that challenges political claims beyond the campaign trail.This increasingly crowded and contentious landscape raises at least two fundamental questions. First, who counts as a legitimate fact-checker? The various kinds of fact-checking at work both inside and outside of journalism must be considered in light of their methods, their audiences, and their goals. And second, how effective are fact-checkers -- or how effective could they be -- in countering widespread misinformation in American political life? The success of the fact-checkers must be assessed in three related areas: changing people's minds, changing journalism, and changing the political conversation. Can fact-checking really stop a lie in its tracks? Can public figures be shamed into being more honest? Or has the damage been done by the time the fact-checkers intervene?This report reviews the shape of the fact-checking landscape today. It pays special attention to the divide between partisan and nonpartisan fact-checkers, and between fact-checking and conventional reporting. It then examines what we know and what we don't about the effectiveness of fact-checking, using the media footprint of various kinds of fact-checkers as an initial indicator of the influence these groups wield. Media analysis shows how political orientation limits fact-checkers' impact in public discourse
    • …
    corecore