96 research outputs found

    Link-based similarity search to fight web spam

    Get PDF
    www.ilab.sztaki.hu/websearch We investigate the usability of similarity search in fighting Web spam based on the assumption that an unknown spam page is more similar to certain known spam pages than to honest pages. In order to be successful, search engine spam never appears in isolation: we observe link farms and alliances for the sole purpose of search engine ranking manipulation. The artificial nature and strong inside connectedness however gave rise to successful algorithms to identify search engine spam. One example is trust and distrust propagation, an idea originating in recommender systems and P2P networks, that yields spam classificators by spreading information along hyperlinks from white and blacklists. While most previous results use PageRank variants for propagation, we form classifiers by investigating similarity top lists of an unknown page along various measures such as co-citation, companion, nearest neighbors in low dimensional projections and SimRank. We test our method over two data sets previously used to measure spam filtering algorithms. 1

    Analyzing and Detecting Malicious Activities in Emerging Communication Platforms

    Get PDF
    Benefiting from innovatory techniques, two communication platforms (online social networking (OSN) platforms and smartphone platforms) have emerged and been widely used in the last few years. However, cybercriminals have also utilized these two emerging platforms to launch malicious activities such as sending spam, spreading malware, hosting botnet command and control (C&C) channels, and performing other illicit activities. All these malicious activities may cause significant economic loss to our society and even threaten national security. Thus, great efforts are indeed needed to mitigate malicious activities on these advanced communication platforms. The goal of this research is to make a deep analysis of malicious activities on OSN and smartphone platforms, and to develop effective and efficient defense approaches against those malicious activities. Firstly, this dissertation performs an empirical analysis of the cyber criminal ecosystem on a large-scale online social networking website space. Secondly, through reverse engineering OSN spammers’ tastes (their preferred targets to spam), this dissertation provides guidelines for building more effective social honeypots on the online social networking platforms, and generates new insights to defend against OSN spammers. Thirdly, this dissertation shows a comprehensive empirical study on analyzing the market-level and network-level behaviors of the Android malware ecosystem. Lastly, by grouping the common program logic among malware families, this dissertation designs an effective system to automatically detect Android malware

    Some Skepticism About Search Neutrality

    Get PDF
    In the last few years, some search-engine critics have suggested that dominant search engines (i.e. Google) should be subject to “search neutrality” regulations. By analogy to network neutrality, search neutrality would require even-handed treatment in search results: It would prevent search engines from playing favorites among websites. Academics, Google competitors, and public-interest groups have all embraced search neutrality. Despite this sudden interest, the case for search neutrality is too muddled to be convincing. While “neutrality” is an appealing-sounding principle, it lacks a clear definition. This essay explores no fewer than eight different meanings that search-neutrality advocates have given the term. None of them would lead to sensible regulation. Some are too ill-defined to measure; others measure the wrong thing. Search is inherently subjective: it always involves guessing the diverse and unknown intentions of users. Regulators, however, need an objective standard to judge search engines against. Most of the common arguments for search neutrality either duck the issue or impose on search users a standard of “right” and “wrong” search results they wouldn’t have chosen for themselves. Search engines help users avoid the websites they don’t want to see; search neutrality would turn that relationship on its head. As currently proposed, search neutrality is likely to make search results spammier, more confusing, and less diverse

    Future of the Internet--and how to stop it

    Get PDF
    vi, 342 p. : ill. ; 25 cmLibro ElectrónicoOn January 9, 2007, Steve Jobs introduced the iPhone to an eager audience crammed into San Francisco’s Moscone Center.1 A beautiful and brilliantly engineered device, the iPhone blended three products into one: an iPod, with the highest-quality screen Apple had ever produced; a phone, with cleverly integrated functionality, such as voicemail that came wrapped as separately accessible messages; and a device to access the Internet, with a smart and elegant browser, and with built-in map, weather, stock, and e-mail capabilities. It was a technical and design triumph for Jobs, bringing the company into a market with an extraordinary potential for growth, and pushing the industry to a new level of competition in ways to connect us to each other and to the Web.Includes bibliographical references (p. 249-328) and index Acceso restringido a miembros del Consorcio de Bibliotecas Universitarias de Andalucía Electronic reproduction. Palo Alto, Calif. : ebrary, 2009 Modo de acceso : World Wide Webpt. 1. The rise and stall of the generative Net -- Battle of the boxes -- Battle of the networks -- Cybersecurity and the generative dilemma -- pt. 2. After the stall -- The generative pattern -- Tethered appliances, software as service, and perfect enforcement -- The lessons of Wikipedia -- pt. 3. Solutions -- Stopping the future of the Internet : stability on a generative Net -- Strategies for a generative future -- Meeting the risks of generativity : Privacy 2.0. Index32

    Facilitating Ontology Reuse Using User-Based Ontology Evaluation

    Get PDF

    Comparative Analysis: Successes and Failures of St. Louis

    Get PDF
    The St. Louis School District (SLSD) provided its students with a virtual education program (VEP) but abandoned it following a cut in federal funding, omitting an alternative pathway for students to complete their education. The problem addressed in this study was the effect of technology and management\u27s decision to discontinue the VEP. The purpose of this qualitative study was to determine management\u27s role and the effect of the technology in discontinuing the VEP. Dewey\u27s theory of education and Koskela and Howell\u27s theory of management established the theoretical foundation for the study. A purposeful sampling selection approach was used to recruit 8 administrator and teacher participants who were knowledgeable about the VEP and who worked in their respective districts. An interview questionnaire was created and used to collect data. The data were processed and analyzed using the thematic analysis approach. The results revealed that technology was not a problem for the 3 school districts, but the SLSD did not prioritize the VEP in its budget. The results of this study might help other institutions keep their online program intact in the event a similar situation occurs. The implications for social change could be that securing a VEP could contribute in producing more well-educated citizens to work in higher-level jobs, drive business development, and contribute to community development in society

    Twitter and society

    Get PDF

    Maryland Personal Jurisdiction Law in the Cyberspace Content

    Get PDF
    A century ago, personal jurisdiction largely hinged on a simple litmus test: the defendant’s presence in the forum state. The issue of personal jurisdiction gained prevalence as the nation evolved from its earlier days of detached, semi-sovereign entities, whose citizens rarely interacted, to a nation where interstate commerce had increased, with interstate litigation growing correspondingly. In Pennoyer v. Neff, the Supreme Court of the United States effectively limited a state’s jurisdiction to persons physically present within its territorial borders. However, in today’s increasingly interconnected world, physical presence appears to represent an anachronism set in the post-Civil War, horse-and-buggy America of Pennoyer. Since then, long-arm jurisdiction has devolved into a confused “state of flux, if not chaos . . . a ‘mess of state long-arm legislation and vacillating Supreme Court jurisprudence.’” Personal jurisdiction jurisprudence has become a latter-day rule against perpetuities, befuddling litigators and courts alike. This befuddlement is compounded by the rapid evolution of technology. Technological progress generates jurisdictional wrinkles at a pace that consistently outstrips the ability of the legal profession to deal with them. In recent years, the complexity of those issues has increased exponentially by the development of cyberspace; actors a world away can exert influence in Maryland with the touch of a keystroke. Of course, at the headquarters of the National Security Agency (“NSA”), actors in Maryland can return those intrusions with interest. However, for counsel representing clients other than the NSA, the issue of what level of “cyber” or “virtual” activity suffices to allow Maryland to assert jurisdiction over an actor is one with immediate repercussions

    Maryland Personal Jurisdiction Law in the Cyberspace Content

    Get PDF
    A century ago, personal jurisdiction largely hinged on a simple litmus test: the defendant’s presence in the forum state. The issue of personal jurisdiction gained prevalence as the nation evolved from its earlier days of detached, semi-sovereign entities, whose citizens rarely interacted, to a nation where interstate commerce had increased, with interstate litigation growing correspondingly. In Pennoyer v. Neff, the Supreme Court of the United States effectively limited a state’s jurisdiction to persons physically present within its territorial borders. However, in today’s increasingly interconnected world, physical presence appears to represent an anachronism set in the post-Civil War, horse-and-buggy America of Pennoyer. Since then, long-arm jurisdiction has devolved into a confused “state of flux, if not chaos . . . a ‘mess of state long-arm legislation and vacillating Supreme Court jurisprudence.’” Personal jurisdiction jurisprudence has become a latter-day rule against perpetuities, befuddling litigators and courts alike. This befuddlement is compounded by the rapid evolution of technology. Technological progress generates jurisdictional wrinkles at a pace that consistently outstrips the ability of the legal profession to deal with them. In recent years, the complexity of those issues has increased exponentially by the development of cyberspace; actors a world away can exert influence in Maryland with the touch of a keystroke. Of course, at the headquarters of the National Security Agency (“NSA”), actors in Maryland can return those intrusions with interest. However, for counsel representing clients other than the NSA, the issue of what level of “cyber” or “virtual” activity suffices to allow Maryland to assert jurisdiction over an actor is one with immediate repercussions
    corecore