319 research outputs found

    Characterizing the Use of Images in State-Sponsored Information Warfare Operations by {R}ussian {Tr}olls on Twitter

    No full text
    State-sponsored organizations are increasingly linked to efforts aimed to exploit social media for information warfare and manipulating public opinion. Typically, their activities rely on a number of social network accounts they control, aka trolls, that post and interact with other users disguised as "regular" users. These accounts often use images and memes, along with textual content, in order to increase the engagement and the credibility of their posts. In this paper, we present the first study of images shared by state-sponsored accounts by analyzing a ground truth dataset of 1.8M images posted to Twitter by accounts controlled by the Russian Internet Research Agency. First, we analyze the content of the images as well as their posting activity. Then, using Hawkes Processes, we quantify their influence on popular Web communities like Twitter, Reddit, 4chan's Politically Incorrect board (/pol/), and Gab, with respect to the dissemination of images. We find that the extensive image posting activity of Russian trolls coincides with real-world events (e.g., the Unite the Right rally in Charlottesville), and shed light on their targets as well as the content disseminated via images. Finally, we show that the trolls were more effective in disseminating politics-related imagery than other images

    Multi-risk assessment in a historical city

    Get PDF
    AbstractNatural hazards pose a significant threat to historical cities which have an authentic and universal value for mankind. This study aims at codifying a multi-risk workflow for seismic and flood hazards, for site-scale applications in historical cities, which provides the Average Annual Loss for buildings within a coherent multi-exposure and multi-vulnerability framework. The proposed methodology includes a multi-risk correlation and joint probability analysis to identify the role of urban development in re-shaping risk components in historical contexts. The workflow is unified by exposure modelling which adopts the same assumptions and parameters. Seismic vulnerability is modelled through an empirical approach by assigning to each building a vulnerability value depending on the European Macroseismic Scale (EMS-98) and modifiers available in literature. Flood vulnerability is modelled by means of stage-damage curves developed for the study area and validated against ex-post damage claims. The method is applied to the city centre of Florence (Italy) listed as UNESCO World Heritage site since 1982. Direct multi-hazard, multi-vulnerability losses are modelled for four probabilistic scenarios. A multi-risk of 3.15 M€/year is estimated for the current situation. In case of adoption of local mitigation measures like floodproofing of basements and installation of steel tie rods, multi-risk reduces to 1.55 M€/yr. The analysis of multi-risk correlation and joint probability distribution shows that the historical evolution of the city centre, from the roman castrum followed by rebuilding in the Middle Ages, the late XIX century and the post WWII, has significantly affected multi-risk in the area. Three identified portions of the study area with a different multi-risk spatial probability distribution highlight that the urban development of the historical city influenced the flood hazard and the seismic vulnerability. The presented multi-risk workflow could be applied to other historical cities and further extended to other natural hazards

    Disinformation warfare: Understanding state-sponsored trolls on twitter and their influence on the web

    Get PDF
    Over the past couple of years, anecdotal evidence has emerged linking coordinated campaigns by state-sponsored actors with efforts to manipulate public opinion on the Web, often around major political events, through dedicated accounts, or “trolls.” Although they are often involved in spreading disinformation on social media, there is little understanding of how these trolls operate, what type of content they disseminate, and most importantly their influence on the information ecosystem. In this paper, we shed light on these questions by analyzing 27K tweets posted by 1K Twitter users identified as having ties with Russia’s Internet Research Agency and thus likely state-sponsored trolls. We compare their behavior to a random set of Twitter users, finding interesting differences in terms of the content they disseminate, the evolution of their account, as well as their general behavior and use of Twitter. Then, using Hawkes Processes, we quantify the influence that trolls had on the dissemination of news on social platforms like Twitter, Reddit, and 4chan. Overall, our findings indicate that Russian trolls managed to stay active for long periods of time and to reach a substantial number of Twitter users with their tweets. When looking at their ability of spreading news content and making it viral, however, we find that their effect on social platforms was minor, with the significant exception of news published by the Russian state-sponsored news outlet RT (Russia Today)

    Liquid baits with Oenococcus oeni increase captures of Drosophila suzukii

    Get PDF
    The spotted-wing drosophila (SWD), Drosophila suzukii Matsumura (Diptera: Drosophilidae), native to Eastern Asia, is an invasive alien species in Europe and the Americas, where it is a severe pest of horticultural crops, including soft fruits and wine grapes. The conventional approach to controlling infestations of SWD involves the use of insecticides, but the frequency of application for population management is undesirable. Consequently, alternative strategies are urgently needed. Effective and improved trapping is important as an early risk detection tool. This study aimed to improve Droskidrink® (DD), a commercially available attractant for SWD. We focused on the chemical and behavioral effects of adding the bacterium Oenococcus oeni (Garvie) to DD and used a new trap design to enhance the effects of attractive lures. We demonstrate that microbial volatile compounds produced by O. oeni are responsible for the increase in the attractiveness of the bait and could be later utilized for the development of a better trapping system. Our results showed that the attractiveness of DD was increased up to two-fold by the addition of commercially available O. oeni when combined with an innovative trap design. The new trap-bait combination increased the number of male and especially female catches at low population densitie

    Bootstrapping Trust in Online Dating: Social Verification of Online Dating Profiles

    Full text link
    Online dating is an increasingly thriving business which boasts billion-dollar revenues and attracts users in the tens of millions. Notwithstanding its popularity, online dating is not impervious to worrisome trust and privacy concerns raised by the disclosure of potentially sensitive data as well as the exposure to self-reported (and thus potentially misrepresented) information. Nonetheless, little research has, thus far, focused on how to enhance privacy and trustworthiness. In this paper, we report on a series of semi-structured interviews involving 20 participants, and show that users are significantly concerned with the veracity of online dating profiles. To address some of these concerns, we present the user-centered design of an interface, called Certifeye, which aims to bootstrap trust in online dating profiles using existing social network data. Certifeye verifies that the information users report on their online dating profile (e.g., age, relationship status, and/or photos) matches that displayed on their own Facebook profile. Finally, we present the results of a 161-user Mechanical Turk study assessing whether our veracity-enhancing interface successfully reduced concerns in online dating users and find a statistically significant trust increase.Comment: In Proceedings of Financial Cryptography and Data Security (FC) Workshop on Usable Security (USEC), 201

    Identification of Novel Pax8 Targets in FRTL-5 Thyroid Cells by Gene Silencing and Expression Microarray Analysis

    Get PDF
    The differentiation program of thyroid follicular cells (TFCs), by far the most abundant cell population of the thyroid gland, relies on the interplay between sequence-specific transcription factors and transcriptional coregulators with the basal transcriptional machinery of the cell. However, the molecular mechanisms leading to the fully differentiated thyrocyte are still the object of intense study. The transcription factor Pax8, a member of the Paired-box gene family, has been demonstrated to be a critical regulator required for proper development and differentiation of thyroid follicular cells. Despite being Pax8 well-characterized with respect to its role in regulating genes involved in thyroid differentiation, genomics approaches aiming at the identification of additional Pax8 targets are lacking and the biological pathways controlled by this transcription factor are largely unknown.To identify unique downstream targets of Pax8, we investigated the genome-wide effect of Pax8 silencing comparing the transcriptome of silenced versus normal differentiated FRTL-5 thyroid cells. In total, 2815 genes were found modulated 72 h after Pax8 RNAi, induced or repressed. Genes previously reported to be regulated by Pax8 in FRTL-5 cells were confirmed. In addition, novel targets genes involved in functional processes such as DNA replication, anion transport, kinase activity, apoptosis and cellular processes were newly identified. Transcriptome analysis highlighted that Pax8 is a key molecule for thyroid morphogenesis and differentiation.This is the first large-scale study aimed at the identification of new genes regulated by Pax8, a master regulator of thyroid development and differentiation. The biological pathways and target genes controlled by Pax8 will have considerable importance to understand thyroid disease progression as well as to set up novel therapeutic strategies

    Histone Acetylation-Mediated Regulation of the Hippo Pathway

    Get PDF
    The Hippo pathway is a signaling cascade recently found to play a key role in tumorigenesis therefore understanding the mechanisms that regulate it should open new opportunities for cancer treatment. Available data indicate that this pathway is controlled by signals from cell-cell junctions however the potential role of nuclear regulation has not yet been described. Here we set out to verify this possibility and define putative mechanism(s) by which it might occur. By using a luciferase reporter of the Hippo pathway, we measured the effects of different nuclear targeting drugs and found that chromatin-modifying agents, and to a lesser extent certain DNA damaging drugs, strongly induced activity of the reporter. This effect was not mediated by upstream core components (i.e. Mst, Lats) of the Hippo pathway, but through enhanced levels of the Hippo transducer TAZ. Investigation of the underlying mechanism led to the finding that cancer cell exposure to histone deacetylase inhibitors induced secretion of growth factors and cytokines, which in turn activate Akt and inhibit the GSK3 beta associated protein degradation complex in drug-affected as well as in their neighboring cells. Consequently, expression of EMT genes, cell migration and resistance to therapy were induced. These processes were suppressed by using pyrvinium, a recently described small molecule activator of the GSK 3 beta associated degradation complex. Overall, these findings shed light on a previously unrecognized phenomenon by which certain anti-cancer agents may paradoxically promote tumor progression by facilitating stabilization of the Hippo transducer TAZ and inducing cancer cell migration and resistance to therapy. Pharmacological targeting of the GSK3 beta associated degradation complex may thus represent a unique approach to treat cancer. © 2013 Basu et al

    EEG Microstate Analysis in Drug-Naive Patients with Panic Disorder

    Get PDF
    Patients with panic disorder (PD) have a bias to respond to normal stimuli in a fearful way. This may be due to the preactivation of fear-associated networks prior to stimulus perception. Based on EEG, we investigated the difference between patients with PD and normal controls in resting state activity using features of transiently stable brain states (microstates). EEGs from 18 drug-naive patients and 18 healthy controls were analyzed. Microstate analysis showed that one class of microstates (with a right-anterior to left-posterior orientation of the mapped field) displayed longer durations and covered more of the total time in the patients than controls. Another microstate class (with a symmetric, anterior-posterior orientation) was observed less frequently in the patients compared to controls. The observation that selected microstate classes differ between patients with PD and controls suggests that specific brain functions are altered already during resting condition. The altered resting state may be the starting point of the observed dysfunctional processing of phobic stimuli

    Two-Sided Malicious Security for Private Intersection-Sum with Cardinality

    Get PDF
    Private intersection-sum with cardinality allows two parties, where each party holds a private set and one of the parties additionally holds a private integer value associated with each element in her set, to jointly compute the cardinality of the intersection of the two sets as well as the sum of the associated integer values for all the elements in the intersection, and nothing beyond that. We present a new construction for private intersection sum with cardinality that provides malicious security with abort and guarantees that both parties receive the output upon successful completion of the protocol. A central building block for our constructions is a primitive called shuffled distributed oblivious PRF (DOPRF), which is a PRF that offers oblivious evaluation using a secret key shared between two parties, and in addition to this allows obliviously permuting the PRF outputs of several parallel oblivious evaluations. We present the first construction for shuffled DOPRF with malicious security. We further present several new sigma proof protocols for relations across Pedersen commitments, ElGamal encryptions, and Camenisch-Shoup encryptions that we use in our main construction, for which we develop new batching techniques to reduce communication. We implement and evaluate the efficiency of our protocol and show that we can achieve communication cost that is only 4-5 times greater than the most efficient semi-honest protocol. When measuring monetary cost of executing the protocol in the cloud, our protocol is 25 times more expensive than the semi-honest protocol. Our construction also allows for different parameter regimes that enable trade-offs between communication and computation
    corecore