194 Hits in 8.3 sec

Does "Like" Really Mean Like? A Study of the Facebook Fake Like Phenomenon and an Efficient Countermeasure [article]

Xinye Lin, Mingyuan Xia, Xue Liu
2015 arXiv   pre-print
To address this fake Like problem, we study the varying patterns of Like count and propose an innovative fake Like detection method based on clustering.  ...  Social networks help to bond people who share similar interests all over the world. As a complement, the Facebook "Like" button is an efficient tool that bonds people with the online information.  ...  In this paper, we provide a comprehensive study on the Facebook Like mechanism and reveal the flaws that are exploited for counterfeiting likes.  ... 
arXiv:1503.05414v3 fatcat:6egjtjb4srd6dgr2pkcwey4hhy


Chema Suárez
2020 Spanish Yearbook of International Law  
Although disinformation is not new, the current digital means have aided tremendously in the extent and depth of their impact.  ...  Could such an action represent a threat to peace and security? How to face it?  ...  could really make a return to the past. (2) Aggression?  ... 
doi:10.17103/sybil.24.6 fatcat:md2tn4wovjbr5fvf6niieehluy

Fake News and Informing Science

2019 Informing Science  
• How does the nature of the fake news content and objectives impact the disinformer's choice of channel?  ...  Through its analysis of the fake news and informing science literature, a number of questions are identified where informing science can possibly contribute to our understanding of fake news.  ...  easy means to share them, they will likely do so and be reaffirmed by feedback from peers through shares, likes, and retweets.  ... 
doi:10.28945/4265 fatcat:iteepwm3una4jhzj5znx7hfwvu

Social Engineering in Social Networking Sites: The Art of Impersonation

Abdullah Algarni, Yue Xu, Taizan Chan
2014 2014 IEEE International Conference on Services Computing  
it turned out that I really liked sex and she did not.  ...  Observations of Participants' Profiles and Timelines Although an interview is a highly efficient way to gather rich empirical data, it can present challenging biases.  ...  H13: Users are more susceptible to SE victimization by attackers who pretend to like their posts and activities or compliment them through comments and posts.  ... 
doi:10.1109/scc.2014.108 dblp:conf/IEEEscc/AlgarniXC14 fatcat:widhpmgj7vgnnkusm5bsleye6m


Milena Ingelevič-Citak, Zuzanna Przyszlak
2020 International Comparative Jurisprudence  
Consequently, it is possible to conclude that the effectiveness of chosen countermeasures, subordinated - as a rule – to the fighting of the jihadi extremists, is doubtful in preventing and combating far-right  ...  This paper investigates whether the counter-terrorism measures developed and implemented within the European Union have a universal character and are equally effective in the context of various types of  ...  Left-wing terrorism Left-wing terrorism phenomenon Left-wing terrorism is a phenomenon frequently nearly omitted in the studies and research.  ... 
doi:10.13165/j.icj.2020.12.005 doaj:6f9276ff84404242b8216cf2c280f035 fatcat:dta57fftrzg6vlhhad4x4jmkwi

The Digital Media in Lithuania: Combating Disinformation and Fake News

Aelita Skarzauskiene, Monika Maciuliene, Ornela Ramasauskaite
2020 Acta Informatica Pragensia  
Lithuania is also an interesting case study for fake news due to its status as a former Soviet state now in the EU.  ...  The prevalence of so-called "fake news" is a relatively recent social phenomenon that is linked to disinformation, misinformation and other forms of networked manipulation facilitated by the rise of the  ...  Scientists test the efficiency of algorithmic technologies to fight fake news on Facebook, Twitter and other portals (Jain et al., 2017; Kumar et al., 2017) and constantly develop new automatic identification  ... 
doi:10.18267/j.aip.134 fatcat:mp7ujrgzjzeu3edluzout3kg3y

Targeting Reputation: A New Vector for Attacks to Critical Infrastructures

Giampiero Giacomello, Oltion Preka
2021 Computer and Information Science  
More specifically, the paper considers the possibility of attacks that have the potential to undermine the stability and reliability of critical infrastructures and advances a preliminary justification  ...  such as Facebook, Twitter, and Instagram has become fundamental.  ...  Acknowledgments Authors would like to express their greatest appreciation to Maria Krasilowez and Emma Michela Giacomello for their help with the editing of this article.  ... 
doi:10.5539/cis.v14n3p63 fatcat:iyqpsfcwxjannkeiqdbrxwh23a

Deepfake Forensics, an AI-synthesized Detection with Deep Convolutional Generative Adversarial Networks

Dafeng Gong
2020 International Journal of Advanced Trends in Computer Science and Engineering  
The findings indicate that although deepfakes pose a major threat to our society, politics and commerce, a variety of means are listed to limit the production of unethical and illegal deepfakes.  ...  The application of these new technologies in many fields makes it more and more difficult to distinguish between true and fake content.  ...  ACKNOWLEDGMENT The work of this paper is supported by the Zhejiang Provincial Natural Science Foundation of China(LY20G010007).  ... 
doi:10.30534/ijatcse/2020/58932020 fatcat:o3wnwepkx5dwvpdg5asnxzzo5q

Follow the green

Gianluca Stringhini, Gang Wang, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Haitao Zheng, Ben Y. Zhao
2013 Proceedings of the 2013 conference on Internet measurement conference - IMC '13  
The users of microblogging services, such as Twitter, use the count of followers of an account as a measure of its reputation or influence.  ...  In this paper, we present a detailed study of Twitter follower markets, report in detail on both the static and dynamic properties of customers of these markets, and develop and evaluate multiple techniques  ...  We use ground-truth to reveal interesting patterns in the dynamics of the users involved in these markets, and in particular, the follower populations of their customers.  ... 
doi:10.1145/2504730.2504731 dblp:conf/imc/StringhiniWEKVZZ13 fatcat:dkirg35mkfc4rlxuumwoh7i5tm

A New Hermeneutics of Suspicion? The Challenge of deepfakes to Theological Epistemology

Clifford Anderson
2019 Cursor_ Zeitschrift für explorative Theologie  
Whereas a "hermeneutics of faith" seeks to discern and bring the meaning of a text to light, a "hermeneutics of suspicion" questions its meaning, looking beneath the surface for repressed or suppressed  ...  Blessed are those who have not seen and yet have come to believe. '" (John 20:29; NRSV) What does it mean to see and yet not to believe?  ...  The apperception of the other does not function as a temporal two step whereby we first see a body, and then analogize to the presence of an ego.  ... 
doi:10.21428/fb61f6aa.771d30b7 fatcat:dntiks2esngwphrrkhnjnuar4q

Fame for sale: Efficient detection of fake Twitter followers

Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi
2015 Decision Support Systems  
Fake followers are dangerous for the social platform and beyond, since they may alter concepts like popularity and influence in the Twittersphere - hence impacting on economy, politics, and society.  ...  Fake followers are those Twitter accounts specifically created to inflate the number of followers of a target account.  ...  Acknowledgements The authors would like to thank the anonymous reviewers who helped improving the quality of the manuscript. References  ... 
doi:10.1016/j.dss.2015.09.003 fatcat:b7spifnphrdhbgkw2lqvytg4re

The socialbot network

Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
2011 Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11  
We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks.  ...  Online Social Networks (OSNs) have become an integral part of today's Web.  ...  We also would like to thank Cormac Herley, Miranda Mowbray, and Adriana Iamnitchi for their feedback on an early draft of this paper.  ... 
doi:10.1145/2076732.2076746 dblp:conf/acsac/BoshmafMBR11 fatcat:s2qfwqrukfbntchngfjwcl4ijm

Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network [article]

Abdullahi Isah
2015 Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet  
Likewise the Facebook help indicated that the like button act as an expression of acknowledgement and care about a content.  ...  Should your workplace Facebook platform for security considers you as a firewall to the WLAN, briefly state what does that mean.  ...  CATEGORY DATA official-app/id580295142 and got an error message of " Connection Timeout".  ... 
doi:10.5278/ fatcat:dqz324xtjbgy3jjyameuc2z3ii

Intervening Practices for Cyberbullying Prevention

Gilberto Marzano
2018 Lupine Online Journal of Nursing & Health care  
The first step for the prevention of cyberbullying is the acquisition of knowledge of what cyberbullying is and how it occurs within a specific context.  ...  This is no easy task, since cyberbullying is a complex and creeping new phenomenon, so much so that researcher's opinions are often divided as to its definition, and there is a lack of agreement on many  ...  A question remains open, however, regarding the media and cyberbullying. Does the increase of cyberspace risks correspond to reality, or is this an over-inflated projection of popular fear?  ... 
doi:10.32474/lojnhc.2018.01.000108 fatcat:33x6dhnvyne4hlpyaa2cqks4sq

Design and analysis of a social botnet

Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu
2013 Computer Networks  
We adopted the design of a traditional web-based botnet and built a prototype of a Socialbot Network (SbN): a group of coordinated programmable socialbots.  ...  Usually, an adversary starts off by running an infiltration campaign using hijacked or adversary-owned OSN accounts, with an objective to connect with a large number of users in the targeted OSN.  ...  In the following section, we evaluate how realistic this assumption is using a case study, and show that the outcomes of the studied system can drastically change once the assumption above does not hold  ... 
doi:10.1016/j.comnet.2012.06.006 fatcat:56yxc3yspngmheu4bkhdj6i4xi
« Previous Showing results 1 — 15 out of 194 results