71 research outputs found

    The insider on the outside: a novel system for the detection of information leakers in social networks

    Get PDF
    Confidential information is all too easily leaked by naive users posting comments. In this paper we introduce DUIL, a system for Detecting Unintentional Information Leakers. The value of DUIL is in its ability to detect those responsible for information leakage that occurs through comments posted on news articles in a public environment, when those articles have withheld material non-public information. DUIL is comprised of several artefacts, each designed to analyse a different aspect of this challenge: the information, the user(s) who posted the information, and the user(s) who may be involved in the dissemination of information. We present a design science analysis of DUIL as an information system artefact comprised of social, information, and technology artefacts. We demonstrate the performance of DUIL on real data crawled from several Facebook news pages spanning two years of news articles

    Relazioni diplomatiche tra la Repubblica di Ragusa e l’Impero del Marocco. La missione Casilari (1779-1780)

    Get PDF
    This article focuses on the diplomatic mission of the Ragusean captain Casilari, to free the crew of a Ragusean ship captured by the Moroccan pirates. Through the relations between Ragusa and the empire of Morocco, the paper deals with an episode of the endemic piracy in the Mediterranean, but it also sheds light on the importance of the Ragusean consular network which provided vital information for the success of the mission

    Data Security Awareness: metodi e strumenti per promuoverla nella scuola secondaria. Il caso del progetto Edu4Sec.

    Get PDF
    Il contributo presenta la cornice teorica e metodologica e l\u2019articolazione del progetto Edu4Sec \u2013 Effective Education for Improving Data Security Awareness attivato nel 2016 presso l\u2019Universit\ue0 di Padova con l\u2019obiettivo di promuovere, negli studenti delle scuole secondarie di secondo grado, consapevolezza circa i rischi che si possono correre in rete ed i comportamenti pi\uf9 efficaci per prevenire e far fronte a tali rischi

    Real-world K-Anonymity applications:The KGEN approach and its evaluation in fraudulent transactions

    Get PDF
    K-Anonymity is a property for the measurement, management, and governance of the data anonymization. Many implementations of k-anonymity have been described in state of the art, but most of them are not practically usable over a large number of attributes in a “Big” dataset, i.e., a dataset drawing from Big Data. To address this significant shortcoming, we introduce and evaluate KGEN, an approach to K-anonymity featuring meta-heuristics, specifically, Genetic Algorithms to compute a permutation of the dataset which is both K-anonymized and still usable for further processing, e.g., for private-by-design analytics. KGEN promotes such a meta-heuristic approach since it can solve the problem by finding a pseudo-optimal solution in a reasonable time over a considerable load of input. KGEN allows the data manager to guarantee a high anonymity level while preserving the usability and preventing loss of information entropy over the data. Differently from other approaches that provide optimal global solutions compatible with smaller datasets, KGEN works properly also over Big datasets while still providing a good-enough K-anonymized but still processable dataset. Evaluation results show how our approach can still work efficiently on a real world dataset, provided by Dutch Tax Authority, with 47 attributes (i.e., the columns of the dataset to be anonymized) and over 1.5K+ observations (i.e., the rows of that dataset), as well as on a dataset with 97 attributes and over 3942 observations.</p

    Counter-terrorism in cyber–physical spaces:Best practices and technologies from the state of the art

    Get PDF
    Context: The demand for protection and security of physical spaces and urban areas increased with the escalation of terroristic attacks in recent years. We envision with the proposed cyber–physical systems and spaces, a city that would indeed become a smarter urbanistic object, proactively providing alerts and being protective against any threat. Objectives: This survey intend to provide a systematic multivocal literature survey comprised of an updated, comprehensive and timely overview of state of the art in counter-terrorism cyber–physical systems, hence aimed at the protection of cyber–physical spaces. Hence, provide guidelines to law enforcement agencies and practitioners providing a description of technologies and best practices for the protection of public spaces. Methods: We analyzed 112 papers collected from different online sources, both from the academic field and from websites and blogs ranging from 2004 till mid-2022. Results: (a) There is no one single bullet-proof solution available for the protection of public spaces. (b) From our analysis we found three major active fields for the protection of public spaces: Information Technologies, Architectural approaches, Organizational field. (c) While the academic suggest best practices and methodologies for the protection of urban areas, the market did not provide any type of implementation of such suggested approaches, which shows a lack of fertilization between academia and industry. Conclusion: The overall analysis has led us to state that there is no one single solution available, conversely, multiple methods and techniques can be put in place to guarantee safety and security in public spaces. The techniques range from architectural design to rethink the design of public spaces keeping security into account in continuity, to emerging technologies such as AI and predictive surveillance.</p

    Internet-of-Things Architectures for Secure Cyber-Physical Spaces: the VISOR Experience Report

    Get PDF
    Internet of things (IoT) technologies are becoming a more and more widespread part of civilian life in common urban spaces, which are rapidly turning into cyber-physical spaces. Simultaneously, the fear of terrorism and crime in such public spaces is ever-increasing. Due to the resulting increased demand for security, video-based IoT surveillance systems have become an important area for research. Considering the large number of devices involved in the illicit recognition task, we conducted a field study in a Dutch Easter music festival in a national interest project called VISOR to select the most appropriate device configuration in terms of performance and results. We iteratively architected solutions for the security of cyber-physical spaces using IoT devices. We tested the performance of multiple federated devices encompassing drones, closed-circuit television, smart phone cameras, and smart glasses to detect real-case scenarios of potentially malicious activities such as mosh-pits and pick-pocketing. Our results pave the way to select optimal IoT architecture configurations -- i.e., a mix of CCTV, drones, smart glasses, and camera phones in our case -- to make safer cyber-physical spaces' a reality

    The use of thrombopoietin-receptor agonists (TPO-RAs) in immune thrombocytopenia (ITP): a “real life” retrospective multicenter experience of the Rete Ematologica Pugliese (REP)

    Get PDF
    Immune thrombocytopenia (ITP) is a disease which sees one-third of patients failing first and subsequent therapeutic approaches, including splenectomy. Thrombopoietin-receptor agonists (TPO-RAs) are recommended for adults who relapse after splenectomy or who have contraindications for splenectomy. In this multicenter study, a total of 124 patients were retrospectively evaluated: 55 (44.3 %) were treated by romiplostim and 69 (55.6 %) by eltrombopag. Mean age, number of young patients (<60 years), time from primary diagnosis of ITP to TPO-RA treatment, and previous lines of therapy were similar in both groups. The overall response rate was 80 % (44/55) for romiplostim and 94.2 % (65/69) for eltrombopag; the duration of response and the time to response were similar (p = NS). The response rate to both drugs in non-splenectomized patients was higher than that of splenectomized patients (p < 0.05). The mean duration of response was 30 months for romiplostim and 15 months for eltrombopag, due to later commercialization of eltrombopag. Failure was the most frequent cause of discontinuation. Thrombotic events were the most consistent adverse events and were recorded in 2 and 3 % of patients treated by romiplostim and eltrombopag, respectively. In conclusion, romiplostim and eltrombopag are effective in the majority of patients with chronic ITP who failed several lines of therapy; whether TPO-RAs could substitute splenectomy is under discussion and studies are warranted
    • …
    corecore