253 research outputs found
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data
Each year, thousands of software vulnerabilities are discovered and reported
to the public. Unpatched known vulnerabilities are a significant security risk.
It is imperative that software vendors quickly provide patches once
vulnerabilities are known and users quickly install those patches as soon as
they are available. However, most vulnerabilities are never actually exploited.
Since writing, testing, and installing software patches can involve
considerable resources, it would be desirable to prioritize the remediation of
vulnerabilities that are likely to be exploited. Several published research
studies have reported moderate success in applying machine learning techniques
to the task of predicting whether a vulnerability will be exploited. These
approaches typically use features derived from vulnerability databases (such as
the summary text describing the vulnerability) or social media posts that
mention the vulnerability by name. However, these prior studies share multiple
methodological shortcomings that inflate predictive power of these approaches.
We replicate key portions of the prior work, compare their approaches, and show
how selection of training and test data critically affect the estimated
performance of predictive models. The results of this study point to important
methodological considerations that should be taken into account so that results
reflect real-world utility
Recommended from our members
Study into Average Civil Compensation in Mesothelioma Cases
The research provides estimates of average civil compensation and legal costs for occupational mesothelioma cases. It was designed to inform the development of proposals by both the Department for Work and Pensions and the Ministry of Justice in relation to helping mesothelioma victims who cannot trace a liable employer to access compensation and to speed up the settlement process for all victims.
Using a variety of measures, average compensation awarded ranged from £137,000 to £153,531 and average legal costs ranged from £22,000 to £28,407. The estimates were based on a survey of 2,334 mesothelioma claims settled between 2007 and 2012.
Regression analysis was used to investigate how civil compensation awarded and legal costs varied with the characteristics of the claimant and features of the claim. It was found that civil compensation decreased with the claimant’s age (by around £3,500 per year) and grew over time between 2007 and 2012. Average civil compensation was higher in Scotland than in England and Wales, and also higher where court proceedings were issued and where the claimant was alive at settlement. The length of the case was not associated with the size of civil compensation.
The regression analysis found that legal costs increased by £4, on average, for every additional £100 of compensation. Legal costs were higher if the claimant was younger, the claim was made in England and Wales rather than Scotland, the claim was made after 2008, court proceedings were issued, the duration of the case was longer and the claimant was deceased on award
Empathy at Play:Embodying Posthuman Subjectivities in Gaming
In this article, we address the need for a posthuman account of the relationship between the avatar and player. We draw on a particular line of posthumanist theory associated closely with the work of Karen Barad, Rosi Braidotti and N. Katherine Hayles that suggests a constantly permeable, fluid and extended subjectivity, displacing the boundaries between human and other. In doing so, we propose a posthuman concept of empathy in gameplay, and we apply this concept to data from the first author’s 18-month ethnographic field notes of gameplay in the MMORPG World of Warcraft. Exploring these data through our analysis of posthuman empathy, we demonstrate the entanglement of avatar–player, machine–human relationship. We show how empathy allows us to understand this relationship as constantly negotiated and in process, producing visceral reactions in the intra-connected avatar–player subject as well as moments of co-produced in-game action that require ‘affective matching’ between subjective and embodied experiences. We argue that this account of the avatar–player relationship extends research in game culture, providing a horizontal, non-hierarchical discussion of its most necessary interaction
Capturing protest in urban environments:The ‘police kettle’ as a territorial strategy
‘Kettling’ has emerged in recent decades as an established, if controversial, tactic of public order policing. Departing from a historical emphasis on dispersal, kettling instead acts to contain protesters within a police cordon for sustained periods of time. This article elaborates upon the spatial and temporal logics of kettling by investigating the conditions of is historical emergence. We argue that kettling should be understood as a territorial strategy that co-evolved in relation to forms of disruptive protest. Whereas techniques of crowd dispersal serve to diffuse a unified collective, ‘kettling’ aims to capture the volatile intensities of public dissent and exhaust its political energies. Drawing on police manuals, media coverage, accounts from activists and expert interviews, we show how the ‘kettle’ re-territorializes protest by acting on its spatio-temporal and affective constitution. By fabricating an inner outside of the urban milieu, freezing the time of collective mobilization and inducing debilitating affects such as fear and boredom, kettling intervenes into the scene of political subjectification that each congregation of protesting bodies seeks to fashion
Exploring the role of Facebook in re-shaping backpacker’s social interactions
The recent Facebook launch of Timeline, Social Graph Search, and the increased use of the mobile Facebook apps has resulted in some important implications for the use of Facebook by backpackers. The purpose of this paper is to (re) explore how Facebook has impacted social relationships between backpackers and their personal, professional, and ‘fellow traveller’ networks, particularly in-light of these recent changes to Facebook and the increased reduction of anonymity while travelling. An exploratory survey was administered to 216 backpackers through social media. Descriptive analysis was conducted to explore the perceived social risks and benefits of Facebook in the context of the backpacking experience
Factors influencing patient satisfaction with dental appearance and treatments they desire to improve aesthetics
Background: We assessed factors influencing patients’ satisfaction with their dental appearance and the
treatments they desired to improve dental aesthetics.
Methods: A cross-sectional study was performed out among 235 adult patients who visited the Hospital Universiti
Sains Malaysia dental clinic. A structured, interviewer-guided questionnaire was used to identify patient satisfaction
with their general dental appearance, cosmetic elements and desired treatments.
Results: The 235 patients consisted of 70 males (29.8%) and 165 females (70.2%), of mean age 31.5 years (SD 13.0).
Of these patients, 124 (52.8%) were not satisfied with their general dental appearance. In addition, 132 patients
(56.2%) were not happy with the color of their teeth, 76 (32.3%), regarded their teeth were poorly aligned, 62
(26.4%), as crowded and 56 (23.4%) protruded. Dissatisfaction with tooth color was significantly higher in female
than in male patients (odds ratio [OR] of 1.99 (95% confidence interval [CI] 1.13-3.50). Tooth whitening was the
treatment most desired by patients (48.1%). Results of multiple logistic regression analysis showed that patient
dissatisfaction with general dental appearance was significantly associated with female gender (OR = 2.18; 95% CI:
1.18-4.03), unhappiness with tooth color (OR = 3.05; 95% CI: 1.74-5.34) and the opinion that their teeth protruded
(OR = 2.91, 95% CI: 1.44-5.91)
Social navigation
In this chapter we present one of the pioneer approaches in supporting users in navigating the complex information spaces, social navigation support. Social navigation support is inspired by natural tendencies of individuals to follow traces of each other in exploring the world, especially when dealing with uncertainties. In this chapter, we cover details on various approaches in implementing social navigation support in the information space as we also connect the concept to supporting theories. The first part of this chapter reviews related theories and introduces the design space of social navigation support through a series of example applications. The second part of the chapter discusses the common challenges in design and implementation of social navigation support, demonstrates how these challenges have been addressed, and reviews more recent direction of social navigation support. Furthermore, as social navigation support has been an inspirational approach to various other social information access approaches we discuss how social navigation support can be integrated with those approaches. We conclude with a review of evaluation methods for social navigation support and remarks about its current state
Recommended from our members
Persistent Activist Communication in Occupy Gezi
We revisit the notion of activist persistence against the backdrop of protest communication on Twitter. We take an event-based approach and examine Occupy Gezi, a series of protests that occurred in Turkey in the early summer of 2013. By cross-referencing survey data with longitudinal Twitter data and in-depth interviews, we investigate the relationship between biographical availability, relational and organisational ties, social and personal costs to persistent activism online and on-location. Contrary to expectations, we find no clear-cut relationship between those factors and sustained commitment to participation in the occupation. We show that persistent activist communication did not feed into enduring organisational structures despite the continuous online activity observed during and beyond the peak of the Gezi occupation. The article concludes with reflections on the organisational ramifications of persistent communication and its significance in a political context posing high risks to participation in dissident politics
Recommended from our members
Lets Talk about Race: Identity, Chatbots, and AI
Why is it so hard for chatbots to talk about race? This work explores how the biased contents of databases, the syntactic focus of natural language processing, and the opaque nature of deep learning algorithms cause chatbots difficulty in handling race-talk. In each of these areas, the tensions between race and chatbots create new opportunities for people and machines. By making the abstract and disparate qualities of this problem space tangible, we can develop chatbots that are more capable of handling race-talk in its many forms. Our goal is to provide the HCI community with ways to begin addressing the question, how can chatbots handle race-talk in new and improved ways
Overthrowing the dictator: a game-theoretic approach to revolutions and media
A distinctive feature of recent revolutions was the key role of social media (e.g. Facebook, Twitter and YouTube). In this paper, we study its role in mobilization. We assume that social media allow potential participants to observe the individual participation decisions of others, while traditional mass media allow potential participants to see only the total number of people who participated before them. We show that when individuals’ willingness to revolt is publicly known, then both sorts of media foster a successful revolution. However, when willingness to revolt is private information, only social media ensure that a revolt succeeds, with mass media multiple outcomes are possible, one of which has individuals not participating in the revolt. This suggests that social media enhance the likelihood that a revolution triumphs more than traditional mass media
- …