200 research outputs found
Mitigating Smishing: Challenges and Future Work
This paper describes three principal challenges in smishing mitigation -
limitations of device affordances, complexity of infrastructure, and cognitive
and contextual factors of mobile device use. We give a high-level overview of
ideas that can mitigate smishing and work around these challenges.Comment: 5 pages. In submission to ConPro: 8th Workshop on Technology and
Consumer Protection, co-located with the 45th IEEE Symposium on Security and
Privacy, San Francisco, CA US
Can virtual reality be a âkiller appâ for journalists to tell great stories?
In print in Vol. 36 Issue 14, p29, June 1, 2015. Available online at http://www.ibj.com/articles/53396-faklaris-can-virtual-reality-be-a-killer-app-for-journalists-to-tell-great-storiesThe author discusses the application of virtual reality in mass media industry and notes its use in storytelling technique for journalism. Written for IBJ's first-ever Innovation issue. A distillation of research done as part of studies in IUPUI's Media Arts and Science master's degree program
Sharing Is Scaring: Legal + Ethical Issues with Shared Content in Social Media and Mobile Messaging Apps
Even if you can reuse, aggregate or share that photo, video, meme or text, should you? Our mixed-methods study explores the legal and ethical issues involved in content-sharing practices in social media and messaging apps through analysis of public policy challenges, related work in Human-Computer Interaction (HCI) literature and quantitative and qualitative data. Key concepts in the study include copyright law, plagiarism, user-generated content (UGC) and fair use
âOh, Snap! The State of E-Discovery as Social Media Goes Mobile via Snapchat, WhatsApp and Other Messaging Appsâ
poster abstractWith the series of decisions in Zubulake v. UBS Warburg1-4 and the revisions to the
Federal Rules of Civil Procedure5, a new field within legal practice appeared, the law regarding electronic discovery (e-discovery). Although the phase of litigation known as discovery has existed for many years, with opposing parties and their lawyers making requests and exchanging documents that are relevant to a case, e-discovery transformed this process from the paper-based, pre-Internet world of discovery to a whole series of rules and decisions related to how to identify, collect, preserve, analyze, review, produce and present electronically-stored information (ESI). Not only is this evidence in digital form, but it also exists a wide range of media and formats, from word processing and spreadsheet files to photographs, blog postings, videos, emails and websites. More recently, debates and court decisions have focused on electronically stored information that is posted on social media sites such as Facebook as well as more informal and transient communications involving text messages and new vendor services for mobile devices, such as WhatsApp and Snapchat. As the researchers will demonstrate through current cases, each new technology that generates electronically-stored information is an opportunity to trace its path through the phases of the e-discovery process, to note the legal, technological, logistical and ethical issues at each phase and to consider any special challenges that lawyers and their support teams might face. This research is particularly timely, given that the Federal Rules of Civil Procedure are being significantly revised again, based on a May 2010 conference on civil litigation at Duke University and more than 2,300 comments from interested practitioners and academics since then.6 Among the revised rules that will become effective on December 1, 2015, if approved by the U.S. Supreme Court and Congress, are several that directly impact electronically-stored information, including Rules 16, 26, 34 and 37, with the goal of making the e-discovery process more efficient and less burdensome and costly
An Investigation of Legal and Ethical Issues with User-Generated Content and Other Forms of Electronically Stored Information Communicated via Social Media, Messaging Apps and Social Devices, Including the Internet of Things
On social networking services, sharing is caring. However, depending on who or what is involved, sharing can be the source of a community transgression, copyright infringement, a violation of employment policies or worse. If people who use social media, mobile messaging apps and social devices do not know where the ethical or legal lines are drawn, in jurisprudence, in vendor Terms of Service, in professional codes of conduct or in keeping with online social norms, they are in jeopardy of being publicly shamed or even sued. Users may also put their employers, friends and colleagues at risk of community, professional or legal penalties in an era where the boundary between work and leisure is becoming even more blurred. This mixed-methods, interdisciplinary research project explores the current state of awareness on a range of legal and ethical issues involving User-Generated Content (UGC) and other forms of Electronically Stored Information (ESI) on social networks and devices for personal and enterprise use and for several different constituencies, including marketers, artists, journalists, academics, educators, entrepreneurs, bloggers, photographers and videographers. The quantitative, numeric data resulting from an online survey as well as qualitative, descriptive data gathered from semi-structured interviews with participants and observations gleaned in contextual inquiry will help address gaps in current research on this subject. In addition, the research findings will guide design directions for a tool, intervention or affordance to help users become better informed about privacy, intellectual property and information governance in the context of electronic sharing and more easily put this knowledge into practice. The first phase of developing the survey protocol is already underway, with a literature review completed and the survey submitted for IRB review as #1602921512. Pilot contextual inquiries and field studies are being pursued to guide development of qualitative research phases in the future.
1. Bohn, J., et al. Social, economic, and ethical implications of ambient intelligence and ubiquitous computing. Ambient Intelligence. Springer Berlin Heidelberg, 2005, 5-29.
2. Cohen, J.E. Configuring the Networked Self: Law, Code, and the Play of Everyday Practice. Yale University Press, 2012.
3. Erickson, T., and Kellogg, W.A. Social translucence: an approach to designing systems that support social processes. ACM Transactions on Computer-Human Interaction (TOCHI) 7.1 (2000): 5983.
4. Faklaris, C., and Hook, S.A. Oh, Snap! The State of Electronic Discovery Amid the Rise of Snapchat, WhatsApp, Kik and Other Mobile Messaging Apps. Federal Lawyer, May 2016 [in press].
5. Fiesler, C., and Bruckman, A.S. Remixers' understandings of fair use online. Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 2014.
6. Hook, S.A., and Faklaris, C. Social Media, The Internet and Electronically Stored Information (ESI) Challenges. National Business Institute, 2015. Available at https://scholarworks.iupui.edu/handle/1805/7177
Experimental Evidence for Using a TTM Stages of Change Model in Boosting Progress Toward 2FA Adoption
Behavior change ideas from health psychology can also help boost end user
compliance with security recommendations, such as adopting two-factor
authentication (2FA). Our research adapts the Transtheoretical Model Stages of
Change from health and wellness research to a cybersecurity context. We first
create and validate an assessment to identify workers on Amazon Mechanical Turk
who have not enabled 2FA for their accounts as being in Stage 1 (no intention
to adopt 2FA) or Stages 2-3 (some intention to adopt 2FA). We randomly assigned
participants to receive an informational intervention with varied content
(highlighting process, norms, or both) or not. After three days, we again
surveyed workers for Stage of Amazon 2FA adoption. We found that those in the
intervention group showed more progress toward action/maintenance (Stages 4-5)
than those in the control group, and those who received content highlighting
the process of enabling 2FA were significantly more likely to progress toward
2FA adoption. Our work contributes support for applying a Stages of Change
Model in usable security.Comment: 41 pages, including the stage algorithm programmed on Mturk, the
survey flow and specific items used, and a link to download the five
informational handouts used for the control condition and the 2FA
intervention condition
Power of the womb: The relationship between population strategies and the status of women
Arms Control & Domestic and International Security (ACDIS
Comparison of the photoluminescence properties of semiconductor quantum dots and non-blinking diamond nanoparticles. Observation of the diffusion of diamond nanoparticles in living cells
Long-term observations of photoluminescence at the single-molecule level were
until recently very diffcult, due to the photobleaching of organic ?uorophore
molecules. Although inorganic semiconductor nanocrystals can overcome this
diffculty showing very low photobleaching yield, they suffer from
photoblinking. A new marker has been recently introduced, relying on diamond
nanoparticles containing photoluminescent color centers. In this work we
compare the photoluminescence of single quantum dots (QDs) to the one of
nanodiamonds containing a single-color center. Contrary to other markers,
photoluminescent nanodiamonds present a perfect photostability and no
photoblinking. At saturation of their excitation, nanodiamonds
photoluminescence intensity is only three times smaller than the one of QDs.
Moreover, the bright and stable photoluminescence of nanodiamonds allows wide
field observations of single nanoparticles motion. We demonstrate the
possibility of recording the tra jectory of such single particle in culture
cells
- âŠ