11 Hits in 7.2 sec

Social Engineering Attacks on Government Opponents: Target Perspectives

William R. Marczak, Vern Paxson
2017 Proceedings on Privacy Enhancing Technologies  
While a fair amount is understood about the nature of these threat actors and the types of tools they use, there is comparatively little understood about targets' perceptions of the risks associated with  ...  Our engagement illuminates the ways that likely targets are vulnerable to the types of social engineering employed by nation-states.  ...  Similarly, the subject's (S 14 ) rooting of their Android to install X Privacy may help the subject better control information shared by their apps, but could increase spyware risks.  ... 
doi:10.1515/popets-2017-0022 dblp:journals/popets/MarczakP17 fatcat:utyd3maaybggrgbcy5rfq5badi

Handcrafted Fraud and Extortion

Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage
2014 Proceedings of the 2014 Conference on Internet Measurement Conference - IMC '14  
We describe the details of the hijacking workflow: the attack vectors, the exploitation phase, and post-hijacking remediation.  ...  Online accounts are inherently valuable resources-both for the data they contain and the reputation they accrue over time.  ...  from the plea recipients to a "doppelganger" account.  ... 
doi:10.1145/2663716.2663749 dblp:conf/imc/BurszteinBMPAAPS14 fatcat:j5zcyl6zmnhevmcowhiqp7zjte

Propertization Metaphors for Bargaining Power and Control of the Self in the Information Age

Daniel D. Barnhizer
Article published in the Cleveland State Law Review.  ...  and using Internet browsers with robust privacy protections.  ...  browser, Privacy Protection Protocols (P3P), adblockers, Internet browsing anonymizers, remailers, and encryption.  ... 
doi:10.17613/mfe4-pm18 fatcat:ozyqnwrd2vevxc2hhuspod7ji4

Corruption and Financial Crime

Sam Vaknin
2018 Figshare  
The Macedonian Police in that period was not in control of the whole territory of the country, especially the western part of Macedonia, which was predominantly  ...  Netscape developed the now lucrative Browser Application market. Microsoft was wrong in discarding the Internet as a fad.  ...  The operators of the black economy enjoy these services without paying for them, without bearing the costs and worse: while others bear the costs.  ... 
doi:10.6084/m9.figshare.7176539 fatcat:pjcdb2c32vh4fp2rlzx3p6qoke

SUPPORTING ROUTE CHOICES VIA REAL-TIME VISUAL TRAFFIC INFORMATION AND COUNTERFACTUAL ARRIVAL TIMES Supporting Route Choices via Real-time Visual Traffic Information and Counterfactual Arrival Times

Daehan Kwak, Daehan Kwak
2017 unpublished
systems, which can contribute to the uncertainty in the route choice.  ...  the drivers' compliance to ii the information system's recommended route.  ...  OSM does not use real-time traffic data, Apple Maps is not supported by web browsers, and Waze map's web browser functions were not stable to properly collect data at the time of the experiment.  ... 

The roof is on fire

Nikolay Vinogradov
2016 unpublished
Participation in the Wireless Community Network "FunkFeuer Wien" enables the building of one's own physical infrastructure.  ...  Installation of new nodes on rooftops in Vienna expands the network, allows for the obtainment of Internet access alternatively to commercial Internet Service Providers, and attracts the high interest  ...  This discussion bothers many active participants because they often try to find new ways by learning from the past.  ... 
doi:10.25365/thesis.42458 fatcat:45u4635ebbghxgwt2nrdnmhcmq

Before the screen, and other stories

Bryan Collins
Or perhaps, as in "The Weirding Path" or "Adornments," they are lured in by the potential the app holds for deceit, for retribution.  ...  Prior to the emergence of Tinder in 2013, discussion of the viability of online dating centered on the failure of online dating platforms to attract heterosexual women.  ...  With other men, this would have bothered him, but Ben's tongue made the roof of his mouth and his lips tingle.  ... 
doi:10.7282/t3rv0r30 fatcat:3grn6aguzbcq3c6fgwmlooqfuq

Paying for attention: narratives of control and the cultural economics of attention, 1990-present PAYING FOR ATTENTION: NARRATIVES OF CONTROL AND THE CULTURAL ECONOMICS OF ATTENTION, 1990-PRESENT by

Robert William, Albanese Iii, Robert William, Albanese Iii
2014 unpublished
To Professor Laura Rigal, thanks for (among many other things) chairing the American Studies dissertation workshop. This is just one of many projects that are better for your rigor and energy.  ...  William James, The Principles of Psychology iv ACKNOWLEDGEMENTS To my family, this is the tip of the iceberg.  ...  It honored the contracts with the past[and] gave them the hostels. Put them away with a new, unspoken contract: Don't bother us.  ... 

McCall_tc.columbia_0055E_11154.pdf [article]

Becoming Otherwise: A Speculative Ethnography of Anarchival Events Seth Andrew McCall At the heart of the archive lie the questions of what will be repeated and what comes first, questions that ripple  ...  Whether social media platforms like Facebook or the monuments of white supremacists, archives increasingly mediate relationships with the past and generate monumental controversies.  ...  John scrolls and scrolls without reaching the end, barring browser malfunctions. Video glitches. John: Gosh. I never really thought much about scrolling. Voiceover: Yes, indeed.  ... 
doi:10.7916/d8-vtsg-1w19 fatcat:pmbefp6p4nd3rd7mqhwcxhpvfu

Visualizing digital discourse : interactional, institutional and ideological perspectives

The second part, beginning with a chapter from Sirpa Leppänen, examines the ways visual resources are used for managing personal relations, and the wider cultural politics of visual representation in these  ...  The first dedicated volume of its kind, Visualizing Digital Discourse brings together sociolinguists and discourse analysts examining the role of visual communication in digital media.  ...  This research would not have been possible without financial support from The Sidney Perry Foundation, The Gen Foundation, The Sir Richard Stapley Educational Trust, The Humanitarian Trust, and The Allan  ... 
doi:10.5167/uzh-184323 fatcat:vy2yukuvvvbuplrq6k6volzjqa

Religions Of Modernity: Relocating The Sacred To The Self And The Digital [chapter]

Dick Houtman, Stef Aupers
Religions of Modernity  
it better.  ...  conclusion that it has no role in public life and takes place only in the privacy of one's own home -or even one's own skull.  ...  In this other reality -or, better, this other planetthere are biological robots, human bodies without 'personality' ready to serve their masters, releasing them from physical eff ort or any kind of work  ... 
doi:10.1163/ej.9789004184510.i-273.6 fatcat:lqi56jnt2fdl7ob4jgqbabwjuy