Filters








3 Hits in 3.7 sec

Industrial Cyber Vulnerabilities: Lessons from Stuxnet and the Internet of Things

Lawrence J. Trautman
2017 Social Science Research Network  
The IoT global market spend is estimated to grow from $591.7 billion in 2014 to $1.3 trillion in 2019 with a compound annual growth rate of 17%.  ...  The installed base of IoT endpoints will grow from 9.7 billion in 2014 to more than 25.6 billion in 2019.  ...  conduct a future attack against another third party. 226 The attackers are looking for information such as design documents that could help them mount a future attack on an industrial control facility  ... 
doi:10.2139/ssrn.2982629 fatcat:3fzkud556vddte275ncjfcbvzi

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

Robert Chesney, Danielle Keats Citron
2018 Social Science Research Network  
Our aim is to provide the first in-depth assessment of the causes and consequences of this disruptive technological change, and to explore the existing and potential tools for responding to it.  ...  This capability makes it possible to create audio and video of real people saying and doing things they never said or did.  ...  ; and blockchain-based record-keeping.  ... 
doi:10.2139/ssrn.3213954 fatcat:njtauzwpdzb4hp5kd3qd4yrp4i

A Storytelling-based Approach to Designing for the Needs of Ageing People

Elena Comincioli, Masood Masoodian
2020 Human Computer Interaction and Emerging Technologies: Adjunct Proceedings from the INTERACT 2019 Workshops   unpublished
Many thanks also to Leah Burns, Aalto University, for the suggestions on the manuscript. Acknowledgment We thank all the participants for their time and feedback.  ...  Acknowledgment The first author wishes to thank Professor Ahmed Seffah for his feedback during the initial phases of this research.  ...  The spreading of fake news, disinformation and conspiracy theories in UGC are forms of deviances as well, while malicious 'pseudo-users' , troll armies and social bots have jarred confidence in even the  ... 
doi:10.18573/book3.a/ fatcat:h5ymj35h4radfpnoar3zhbh7ii