A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Does "Like" Really Mean Like? A Study of the Facebook Fake Like Phenomenon and an Efficient Countermeasure
[article]
2015
arXiv
pre-print
To address this fake Like problem, we study the varying patterns of Like count and propose an innovative fake Like detection method based on clustering. ...
Social networks help to bond people who share similar interests all over the world. As a complement, the Facebook "Like" button is an efficient tool that bonds people with the online information. ...
In this paper, we provide a comprehensive study on the Facebook Like mechanism and reveal the flaws that are exploited for counterfeiting likes. ...
arXiv:1503.05414v3
fatcat:6egjtjb4srd6dgr2pkcwey4hhy
FROM BULLETS TO FAKE NEWS: DISINFORMATION AS A WEAPON OF MASS DISTRACTION. WHAT SOLUTIONS DOES INTERNATIONAL LAW PROVIDE?
2020
Spanish Yearbook of International Law
Although disinformation is not new, the current digital means have aided tremendously in the extent and depth of their impact. ...
Could such an action represent a threat to peace and security? How to face it? ...
could really make a return to the past. (2) Aggression? ...
doi:10.17103/sybil.24.6
fatcat:md2tn4wovjbr5fvf6niieehluy
Fake News and Informing Science
2019
Informing Science
• How does the nature of the fake news content and objectives impact the disinformer's choice of channel? ...
Through its analysis of the fake news and informing science literature, a number of questions are identified where informing science can possibly contribute to our understanding of fake news. ...
easy means to share them, they will likely do so and be reaffirmed by feedback from peers through shares, likes, and retweets. ...
doi:10.28945/4265
fatcat:iteepwm3una4jhzj5znx7hfwvu
Social Engineering in Social Networking Sites: The Art of Impersonation
2014
2014 IEEE International Conference on Services Computing
it turned out that I really liked sex and she did not. ...
Observations of Participants' Profiles and Timelines Although an interview is a highly efficient way to gather rich empirical data, it can present challenging biases. ...
H13: Users are more susceptible to SE victimization by attackers who pretend to like their posts and activities or compliment them through comments and posts. ...
doi:10.1109/scc.2014.108
dblp:conf/IEEEscc/AlgarniXC14
fatcat:widhpmgj7vgnnkusm5bsleye6m
JIHADIST, FAR-RIGHT AND FAR-LEFT TERRORISM IN CYBERSPACE – SAME THREAT AND SAME COUNTERMEASURES?
2020
International Comparative Jurisprudence
Consequently, it is possible to conclude that the effectiveness of chosen countermeasures, subordinated - as a rule – to the fighting of the jihadi extremists, is doubtful in preventing and combating far-right ...
This paper investigates whether the counter-terrorism measures developed and implemented within the European Union have a universal character and are equally effective in the context of various types of ...
Left-wing terrorism
Left-wing terrorism phenomenon Left-wing terrorism is a phenomenon frequently nearly omitted in the studies and research. ...
doi:10.13165/j.icj.2020.12.005
doaj:6f9276ff84404242b8216cf2c280f035
fatcat:dta57fftrzg6vlhhad4x4jmkwi
The Digital Media in Lithuania: Combating Disinformation and Fake News
2020
Acta Informatica Pragensia
Lithuania is also an interesting case study for fake news due to its status as a former Soviet state now in the EU. ...
The prevalence of so-called "fake news" is a relatively recent social phenomenon that is linked to disinformation, misinformation and other forms of networked manipulation facilitated by the rise of the ...
Scientists test the efficiency of algorithmic technologies to fight fake news on Facebook, Twitter and other portals (Jain et al., 2017; Kumar et al., 2017) and constantly develop new automatic identification ...
doi:10.18267/j.aip.134
fatcat:mp7ujrgzjzeu3edluzout3kg3y
Targeting Reputation: A New Vector for Attacks to Critical Infrastructures
2021
Computer and Information Science
More specifically, the paper considers the possibility of attacks that have the potential to undermine the stability and reliability of critical infrastructures and advances a preliminary justification ...
such as Facebook, Twitter, and Instagram has become fundamental. ...
Acknowledgments Authors would like to express their greatest appreciation to Maria Krasilowez and Emma Michela Giacomello for their help with the editing of this article. ...
doi:10.5539/cis.v14n3p63
fatcat:iyqpsfcwxjannkeiqdbrxwh23a
Deepfake Forensics, an AI-synthesized Detection with Deep Convolutional Generative Adversarial Networks
2020
International Journal of Advanced Trends in Computer Science and Engineering
The findings indicate that although deepfakes pose a major threat to our society, politics and commerce, a variety of means are listed to limit the production of unethical and illegal deepfakes. ...
The application of these new technologies in many fields makes it more and more difficult to distinguish between true and fake content. ...
ACKNOWLEDGMENT The work of this paper is supported by the Zhejiang Provincial Natural Science Foundation of China(LY20G010007). ...
doi:10.30534/ijatcse/2020/58932020
fatcat:o3wnwepkx5dwvpdg5asnxzzo5q
Follow the green
2013
Proceedings of the 2013 conference on Internet measurement conference - IMC '13
The users of microblogging services, such as Twitter, use the count of followers of an account as a measure of its reputation or influence. ...
In this paper, we present a detailed study of Twitter follower markets, report in detail on both the static and dynamic properties of customers of these markets, and develop and evaluate multiple techniques ...
We use ground-truth to reveal interesting patterns in the dynamics of the users involved in these markets, and in particular, the follower populations of their customers. ...
doi:10.1145/2504730.2504731
dblp:conf/imc/StringhiniWEKVZZ13
fatcat:dkirg35mkfc4rlxuumwoh7i5tm
A New Hermeneutics of Suspicion? The Challenge of deepfakes to Theological Epistemology
2019
Cursor_ Zeitschrift für explorative Theologie
Whereas a "hermeneutics of faith" seeks to discern and bring the meaning of a text to light, a "hermeneutics of suspicion" questions its meaning, looking beneath the surface for repressed or suppressed ...
Blessed are those who have not seen and yet have come to believe. '" (John 20:29; NRSV) What does it mean to see and yet not to believe? ...
The apperception of the other does not function as a temporal two step whereby we first see a body, and then analogize to the presence of an ego. ...
doi:10.21428/fb61f6aa.771d30b7
fatcat:dntiks2esngwphrrkhnjnuar4q
Fame for sale: Efficient detection of fake Twitter followers
2015
Decision Support Systems
Fake followers are dangerous for the social platform and beyond, since they may alter concepts like popularity and influence in the Twittersphere - hence impacting on economy, politics, and society. ...
Fake followers are those Twitter accounts specifically created to inflate the number of followers of a target account. ...
Acknowledgements The authors would like to thank the anonymous reviewers who helped improving the quality of the manuscript.
References ...
doi:10.1016/j.dss.2015.09.003
fatcat:b7spifnphrdhbgkw2lqvytg4re
The socialbot network
2011
Proceedings of the 27th Annual Computer Security Applications Conference on - ACSAC '11
We operated such an SbN on Facebook-a 750 million user OSN-for about 8 weeks. ...
Online Social Networks (OSNs) have become an integral part of today's Web. ...
We also would like to thank Cormac Herley, Miranda Mowbray, and Adriana Iamnitchi for their feedback on an early draft of this paper. ...
doi:10.1145/2076732.2076746
dblp:conf/acsac/BoshmafMBR11
fatcat:s2qfwqrukfbntchngfjwcl4ijm
Implementation of SNS Model for Intrusion Prevention in Wireless Local Area Network
[article]
2015
Ph.d.-serien for Det Teknisk-Naturvidenskabelige Fakultet, Aalborg Universitet
Likewise the Facebook help indicated that the like button act as an expression of acknowledgement and care about a content. ...
Should your workplace Facebook platform for security considers you as a firewall to the WLAN, briefly state what does that mean. ...
CATEGORY DATA official-app/id580295142 and got an error message of " Connection Timeout". ...
doi:10.5278/vbn.phd.engsci.00017
fatcat:dqz324xtjbgy3jjyameuc2z3ii
Intervening Practices for Cyberbullying Prevention
2018
Lupine Online Journal of Nursing & Health care
The first step for the prevention of cyberbullying is the acquisition of knowledge of what cyberbullying is and how it occurs within a specific context. ...
This is no easy task, since cyberbullying is a complex and creeping new phenomenon, so much so that researcher's opinions are often divided as to its definition, and there is a lack of agreement on many ...
A question remains open, however, regarding the media and cyberbullying. Does the increase of cyberspace risks correspond to reality, or is this an over-inflated projection of popular fear? ...
doi:10.32474/lojnhc.2018.01.000108
fatcat:33x6dhnvyne4hlpyaa2cqks4sq
Design and analysis of a social botnet
2013
Computer Networks
We adopted the design of a traditional web-based botnet and built a prototype of a Socialbot Network (SbN): a group of coordinated programmable socialbots. ...
Usually, an adversary starts off by running an infiltration campaign using hijacked or adversary-owned OSN accounts, with an objective to connect with a large number of users in the targeted OSN. ...
In the following section, we evaluate how realistic this assumption is using a case study, and show that the outcomes of the studied system can drastically change once the assumption above does not hold ...
doi:10.1016/j.comnet.2012.06.006
fatcat:56yxc3yspngmheu4bkhdj6i4xi
« Previous
Showing results 1 — 15 out of 194 results