281 research outputs found

    Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

    Full text link
    Each year, thousands of software vulnerabilities are discovered and reported to the public. Unpatched known vulnerabilities are a significant security risk. It is imperative that software vendors quickly provide patches once vulnerabilities are known and users quickly install those patches as soon as they are available. However, most vulnerabilities are never actually exploited. Since writing, testing, and installing software patches can involve considerable resources, it would be desirable to prioritize the remediation of vulnerabilities that are likely to be exploited. Several published research studies have reported moderate success in applying machine learning techniques to the task of predicting whether a vulnerability will be exploited. These approaches typically use features derived from vulnerability databases (such as the summary text describing the vulnerability) or social media posts that mention the vulnerability by name. However, these prior studies share multiple methodological shortcomings that inflate predictive power of these approaches. We replicate key portions of the prior work, compare their approaches, and show how selection of training and test data critically affect the estimated performance of predictive models. The results of this study point to important methodological considerations that should be taken into account so that results reflect real-world utility

    Gender Differences in Academic Efficacy across STEM Fields

    Get PDF
    Cultural processes can reduce self-selection into math and science fields, but it remains unclear how confidence in computer science develops, where women are currently the least represented in STEM (science, technology, engineering, and mathematics). Few studies evaluate both computer skills and self-assessments of skill. In this paper, we evaluate gender differences in efficacy across three STEM fields using a data set of middle schoolers, a particularly consequential period for academic pathways. Even though girls and boys do not significantly differ in terms of math grades and have similar levels of computer skill, the gender gap in computer efficacy is twice as large as the gap for math. We offer support for disaggregation of STEM fields, so the unique meaning making around computing can be addressed

    Troubling stories of the end of occupy : feminist narratives of betrayal at occupy Glasgow

    Get PDF
    This article offers a feminist take on the question of why Occupy camps closed down, in the form of a narrative analysis of interviews from participants in Occupy Glasgow. In response to the emergence of an activist discourse emphasising the role of external forces in camp closure and the existence of a longer-term legacy in terms of individual and community politicisation, I build here on feminist interventions that point instead to serious internal problems within the camps and thus to a more limited legacy. Interrogating the plotting, characterisation and denouement of interviewee narratives, I show that feminist participants in Occupy Glasgow characterise the trajectory of the camp as a tragedy, attribute responsibility for the camp’s demise to co-campers and sometimes to themselves, and present the outcome of Occupy Glasgow as limited, and in some cases even traumatic. This raises serious questions about the culmination and outcomes of Occupy in Glasgow and more generally, and indicates the extent of the hard work remaining if future mobilisation against neoliberal austerity is to be more inclusive and sustainable. The article closes by considering the theoretical implications for the wider question of why movements come to an end

    Context Is Everything Sociality and Privacy in Online Social Network Sites

    Full text link
    International audienceSocial Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymoron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of 'friend'. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network Sites

    Empathy at Play:Embodying Posthuman Subjectivities in Gaming

    Get PDF
    In this article, we address the need for a posthuman account of the relationship between the avatar and player. We draw on a particular line of posthumanist theory associated closely with the work of Karen Barad, Rosi Braidotti and N. Katherine Hayles that suggests a constantly permeable, fluid and extended subjectivity, displacing the boundaries between human and other. In doing so, we propose a posthuman concept of empathy in gameplay, and we apply this concept to data from the first author’s 18-month ethnographic field notes of gameplay in the MMORPG World of Warcraft. Exploring these data through our analysis of posthuman empathy, we demonstrate the entanglement of avatar–player, machine–human relationship. We show how empathy allows us to understand this relationship as constantly negotiated and in process, producing visceral reactions in the intra-connected avatar–player subject as well as moments of co-produced in-game action that require ‘affective matching’ between subjective and embodied experiences. We argue that this account of the avatar–player relationship extends research in game culture, providing a horizontal, non-hierarchical discussion of its most necessary interaction

    Rising tides or rising stars?: Dynamics of shared attention on twitter during media events

    Get PDF
    "Media events" generate conditions of shared attention as many users simultaneously tune in with the dual screens of broadcast and social media to view and participate. We examine how collective patterns of user behavior under conditions of shared attention are distinct from other "bursts" of activity like breaking news events. Using 290 million tweets from a panel of 193,532 politically active Twitter users, we compare features of their behavior during eight major events during the 2012 U.S. presidential election to examine how patterns of social media use change during these media events compared to "typical" time and whether these changes are attributable to shifts in the behavior of the population as a whole or shifts from particular segments such as elites. Compared to baseline time periods, our findings reveal that media events not only generate large volumes of tweets, but they are also associated with (1) substantial declines in interpersonal communication, (2) more highly concentrated attention by replying to and retweeting particular users, and (3) elite users predominantly benefiting from this attention. These findings empirically demonstrate how bursts of activity on Twitter during media events significantly alter underlying social processes of interpersonal communication and social interaction. Because the behavior of large populations within socio-technical systems can change so dramatically, our findings suggest the need for further research about how social media responses to media events can be used to support collective sensemaking, to promote informed deliberation, and to remain resilient in the face of misinformation. © 2014 Lin et al

    Social media and disasters: human security, environmental racism, and crisis communication in Hurricane Irma response

    Get PDF
    Social media has been widely recognized as key communication channel in disaster situations. However, there is limited empirical investigation on how the intersecting issues of social order, environmental impacts, and crisis communication unfold from the perspective of a social media user. This study examines 60,449 tweets to and from the news media in Florida during and immediately after Hurricane Irma in September, 2017. Based on a critical review of the literature coupled with an eight-category coding scheme (including second-hand reporting, reporting on self-experience, requesting help, coordinating relief efforts, and expressing well wishes), the article assesses the content and timing of tweets before, during, and after the storm. It finds that thematically, twitter coverage not only covers the storm itself but pressing social issues such as looting, price gouging, the privileging of elites in rebuilding efforts, environmental vulnerability, and abandoning pets. Temporally, the volume of different tweets peaked and dropped at different stages; for example, tweets about personal experience peaked when the hurricane hit the ground while requests for help peaked in the days after the hurricane. The study allows for a better understanding of the sociological, environmental, and even social justice impacts and related disaster response through the use of social media

    Exploring the role of Facebook in re-shaping backpacker’s social interactions

    Get PDF
    The recent Facebook launch of Timeline, Social Graph Search, and the increased use of the mobile Facebook apps has resulted in some important implications for the use of Facebook by backpackers. The purpose of this paper is to (re) explore how Facebook has impacted social relationships between backpackers and their personal, professional, and ‘fellow traveller’ networks, particularly in-light of these recent changes to Facebook and the increased reduction of anonymity while travelling. An exploratory survey was administered to 216 backpackers through social media. Descriptive analysis was conducted to explore the perceived social risks and benefits of Facebook in the context of the backpacking experience
    • …
    corecore