Safety and Security on the Internet: Challenges
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Cyber Violence Against Women and Girls
CYBER VIOLENCE AGAINST WOMEN AND GIRLS A WORLD-WIDE WAKE-UP CALL 2015 Photo credits:Shutterstock A REPORT BY THE UN BROADBAND COMMISSION FOR DIGITAL DEVELOPMENT WORKING GROUP ON BROADBAND AND GENDER CYBER VIOLENCE AGAINST WOMEN AND GIRLS: A WORLD-WIDE WAKE-UP CALL Acknowledgements This Report has been written collaboratively, drawing on insights and rich contributions from a range of Commissioners and Expert Members of the Working Group on Broadband and Gender. It has been researched and compiled by lead author Nidhi Tandon, assisted by Shannon Pritchard, with editorial inputs by teams from UN Women, UNDP and ITU. Design concepts were developed by Céline Desthomas of ITU. We wish to thank the following people for their contributions and kind review and comments (listed in alphabetical order of institution, followed by alphabetical order of surname): Dafne Sabanes Plou, Jac sm Kee and Chat Garcia Ramilo (APC); Dr Nancy Hafkin; Minerva Novero- Belec (UNDP); Corat Suniye Gulser (UNESCO); Jennifer Breslin and team (UN Women); Samia Melhem and team (World Bank). About the Commission The Broadband Commission for Digital Development was launched by the International Telecommunication Union (ITU) and the United Nations Educational, Scientific and Cultural Organization (UNESCO) in response to UN Secretary-General Ban Ki-moon’s call to step up efforts to meet the Millennium Development Goals. Established in May 2010, the Commission unites top industry executives with government leaders, thought leaders and policy pioneers and international agencies and organizations concerned with development. The Broadband Commission embraces a range of different perspectives in a multi-stakeholder approach to promoting the roll-out of broadband, as well as providing a fresh approach to UN and business engagement. -
Staying Safe Online: Gender and Safety on the Internet
MEDITERRANEAN INSTITUTE OF GENDER STUDIES (MIGS) Staying Safe Online: Gender and Safety on the Internet Experiences of Young Women and Men in Cyprus Nicosia, Cyprus November 2014 Staying Safe Online: Gender and Safety on the Internet © 2014, Mediterranean Institute of Gender Studies, all rights reserved. 46 Makedonitissas Ave. P.O. Box 24005, Nicosia 1703 Cyprus Authors: Elena Rousou, Christina Kaili Edited by Susana Elisa Pavlou Published by the Mediterranean Institute of Gender Studies (M.I.G.S.) on December 2014 Coordinated by Gender Studies, o.p.s., Czech Republic Partner Organisations Feminoteka , Poland ProFem, Czech Republic Mediterranean Institute of Gender Studies (M.I.G.S.), Cyprus This publication has been produced with the financial support of the DAPHNE III Programme of the European Union. The contents of this publication are the sole responsibility of the Mediterranean Institute of Gender Studies (M.I.G.S.) and can in no way be taken to reflect the views of the European Commission. 1 Table of Contents 1. INTRODUCTION ........................................................................................................ 4 1.1 SCOPE, GOALS AND OBJECTIVES ....................................................................................... 4 1.2 METHODOLOGY ............................................................................................................. 4 1.3 DEFINITIONS ................................................................................................................. 6 2. THEORETICAL FRAMEWORK -
Sense of Community and Political Mobilization in Virtual Communities: the Role of Dispositional and Situational Variables
Butler University Digital Commons @ Butler University Scholarship and Professional Work - Communication College of Communication 2010 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang Butler University, [email protected] Follow this and additional works at: https://digitalcommons.butler.edu/ccom_papers Part of the Communication Technology and New Media Commons, Social Influence and oliticalP Communication Commons, and the Social Media Commons Recommended Citation Wang, Kevin Y., "Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables" (2010). Scholarship and Professional Work - Communication. 115. https://digitalcommons.butler.edu/ccom_papers/115 This Article is brought to you for free and open access by the College of Communication at Digital Commons @ Butler University. It has been accepted for inclusion in Scholarship and Professional Work - Communication by an authorized administrator of Digital Commons @ Butler University. For more information, please contact [email protected]. Observatorio (OBS*) Journal, vol.4 - nº1 (2010), 073-096 1646-5954/ERC123483/2010 073 Sense of Community and Political Mobilization in Virtual Communities: The Role of Dispositional and Situational Variables Kevin Y. Wang, University of Minnesota – School of Journalism and Mass Communication Abstract This paper explores the psychological processes that connect virtual communities to political behavior. -
Coronavirus Social Engineering Attacks: Issues and Recommendations
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 11, No. 5, 2020 Coronavirus Social Engineering Attacks: Issues and Recommendations Ahmed Alzahrani Faculty of Computing and Information Technology King Abdulaziz University, Jeddah Saudia Arabia Abstract—During the current coronavirus pandemic, Social engineering attacks fall into four types: physical, cybercriminals are exploiting people’s anxieties to steal technical, social, and socio-technical [3]. In general, there are confidential information, distribute malicious software, perform two methods of social engineering attacks, human-based and ransomware attacks and use other social engineering attacks. computer-based. Human-based social engineering requires The number of social engineering attacks is increasing day by interaction with humans to gain the desired information. day due to people's failure to recognize the attacks. Therefore, Impersonation is the most common approach for this type, via there is an urgent need for solutions to help people understand a phone call or text message (see Fig. 2), online, or even in social engineering attacks and techniques. This paper helps person. Computer-based social engineering uses computer individuals and industry by reviewing the most common software to try to gain the required information. This attack coronavirus social engineering attacks and provides includes sending scam emails asking the user to open an recommendations for responding to such an attack. The paper also discusses the psychology behind social engineering and attachment to check the latest statistics about coronavirus or introduces security awareness as a solution to reduce the risk of information about coronavirus safety measures (see Fig. 1). social engineering attacks. Cybercriminals can also create a fake website to trick users into downloading malware to steal users' credentials and online Keywords—Social engineering; coronavirus; COVID-19; banking information. -
Lexical Innovation on the Internet - Neologisms in Blogs
Zurich Open Repository and Archive University of Zurich Main Library Strickhofstrasse 39 CH-8057 Zurich www.zora.uzh.ch Year: 2009 Lexical innovation on the internet - neologisms in blogs Smyk-Bhattacharjee, Dorota Abstract: Studien im Bereich des Sprachwandels beschreiben traditionellerweise diachronische Verän- derungen in den Kernsubsystemen der Sprache und versuchen, diese zu erklären. Obwohl ein Grossteil der Sprachwissenschaftler sich darüber einig ist, dass die aktuellen Entwicklungen in einer Sprache am klarsten im Wortschatz reflektiert werden, lassen die lexikographischen und morphologischen Zugänge zur Beobachtung des lexikalischen Wandels wichtige Fragen offen. So beschäftigen sich letztere typischer- weise mit Veränderungen, die schon stattgefunden haben, statt sich dem sich zum aktuellen Zeitpunkt vollziehenden Wandel zu widmen. Die vorliegende Dissertation bietet eine innovative Lösung zur Un- tersuchung des sich vollziehenden lexikalischen Wandels sowohl in Bezug auf die Datenquelle als auch bzgl. der verwendeten Methodologie. In den vergangenen 20 Jahren hat das Internet unsere Art zu leben, zu arbeiten und zu kommunizieren drastisch beeinflusst. Das Internet bietet aber auch eine Masse an frei zugänglichen Sprachdaten und damit neue Möglichkeiten für die Sprachforschung. Die in dieser Arbeit verwendeten Daten stammen aus einem Korpus englischsprachiger Blogs, eine Art Computer gestützte Kommunikation (computer-mediated communication, CMC). Blogs bieten eine neue, beispiel- lose Möglichkeit, Wörtern nachzuspüren zum Zeitpunkt, in der sie Eingang in die Sprache finden. Um die Untersuchung des Korpus zu vereinfachen, wurde eine Software mit dem Namen Indiana entwickelt. Dieses Instrument verbindet den Korpus basierten Zugang mit einer lexikographischen Analyse. Indiana verwendet eine Kombination von HTML-to-text converter, eine kumulative Datenbank und verschiede Filter, um potentielle Neologismen im Korpus identifizieren zu können. -
Internet Safety 101
INTERNET SAFETY 101 Learn what you need to know to keep yourself and your family safe on the internet. Why are you here? To learn: About the type of threats you may encounter online To gain a safer mindset towards using the internet Precautions we should all be taking on a regular basis How to protect yourself and your device Google Yourself The easiest way to track your digital footprint Try searching for: Variations of your name Email address Home address Work address Phone number Found something you would like taken down? Alter your privacy settings on social media accounts. Deactivate old and unused accounts. Go through sites on an individual basis to see if you can delete your information from their listings or request to have it removed. Safe Browsing Practices Look at your browser’s built in security settings “Sandboxing” – Each tab is run in a separate application environment. If harmful content is discovered in one tab, it will not spread any further. Always keep browser updated for latest security features Downloading Content Treat all downloads as suspicious until proven safe. Always SAVE files, don’t RUN them. This will give your system a chance to check for threats. No one wants to do it, but read the terms and conditions. Freeware and P2P files should be treated with extreme caution. Safe Browsing Practices Continued… Pop-Ups Always keep your pop-up blockers ON Usually contain unwanted advertisements or malware “Malware” – any software specifically intended to damage your computer system Some pop-ups are legitimate. Use icon in the address bar to allow safe pop-ups. -
Social Engineering Attacks and the Corona Virus Pandemic
ISSN (Online): 2455-3662 EPRA International Journal of Multidisciplinary Research (IJMR) - Peer Reviewed Journal Volume: 6 | Issue: 10 | October 2020 || Journal DOI: 10.36713/epra2013 || SJIF Impact Factor: 7.032 ||ISI Value: 1.188 SOCIAL ENGINEERING ATTACKS AND THE CORONA VIRUS PANDEMIC Ajayi Adebowale. O.1 Ajayi Oluwabukola. F 2 1 Lecturer, 2 Lecturer, Computer Science Department, Computer Science Department, Babcock University, Babcock University, Ilishan-Remo Ogun State, Ilishan-Remo Ogun State, Nigeria. Nigeria. ABSTRACT Social engineering attacks are amongst the most successful and rampant cyber-attacks. The major focus of social engineering is the manipulation of human targets to further the objectives of an attacker. The present coronavirus pandemic has had a profound effect on how we live and work and has proved to be perfect fodder for the nefarious activities of cybercriminals. This study delineates the underlying problems in social engineering vis-à-vis the corona pandemic. A descriptive survey was carried out on social engineering attacks and the corona virus pandemic including focused group discussions with some cyber attackers and regular users of information systems. A review of current covid- 19 related social engineering schemes are presented. Insights gotten from synthesizing the knowledge gathered from the analysis of social engineering attacks during Covid-19 are also highlighted in this paper. It is very likely that many people will continue to work from home or, at the very least, switch back and forth between home and traditional offices in their normal routines. The study therefore recommends that as the global community stays on high alert for signs of new pandemics or recurrence of the present one, safeguards will need to be put in place ensure that these anxieties don’t expose enterprise IT assets to social engineering tactics. -
Lessons from the History of Internet Studies
Allen, M. 2020. Lessons from the History of Internet Studies. Cultural Science Journal, 12(1), pp. 68–76. DOI: cultural science https://doi.org/10.5334/csci.139 RESEARCH Lessons from the History of Internet Studies Matthew Allen Institute for Social Change, University of Tasmania, AU [email protected] A Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium in celebration of the 20-year anniversary of the founding of Internet Studies at Curtin University. Matthew is Australia’s first Professor of Internet Studies, having established the world-leading Internet Studies department at Curtin University where he worked from 1993 to 2012. Keywords: Internet Studies; Open Literacy; Institutional Change Matthew Allen was invited to give a Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium. Matthew is Australia’s first Professor of Internet Studies, hav- ing established the world-leading Internet Studies department at Curtin University where he worked from 1993 to 2012. He then took up the role of Head of School, Communication and Creative Arts at Deakin University (2013–2019). Matthew is former president of the Association of Internet Researchers, and co-editor of the pres- tigious Handbook of Internet Research, now in its second edition. Matthew is also a nationally awarded educa- tor (AAUT, 2000) and Fellow of the Australian Learning and Teaching Council. His research covers topics includ- ing the history of the Internet, drug use and online communication, Australia’s development of broadband usage, and online learning and education. He joined the University of Tasmania’s Institute for Social Change at the start of 2020 and is currently researching the uses of Internet technologies during the COVID-19 pandemic and the response of students to enforced online learning. -
The Digital Divide: the Internet and Social Inequality in International Perspective
http://www.diva-portal.org This is the published version of a chapter published in The Digital Divide: The Internet and Social Inequality in International Perspective. Citation for the original published chapter: Meinrath, S., Losey, J., Lennett, B. (2013) Afterword. Internet Freedom, Nuanced Digital Divide, and the Internet Craftsman. In: Massimo Ragnedda and Glenn W. Muschert (ed.), The Digital Divide: The Internet and Social Inequality in International Perspective (pp. 309-316). London: Routledge Routledge advances in sociology N.B. When citing this work, cite the original published chapter. Permanent link to this version: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-100423 The Digital Divide This book provides an in-depth comparative analysis of inequality and the stratification of the digital sphere. Grounded in classical sociological theories of inequality, as well as empirical evidence, this book defines “the digital divide” as the unequal access and utility of internet communications technologies and explores how it has the potential to replicate existing social inequalities, as well as create new forms of stratification. The Digital Divide examines how various demographic and socio-economic factors including income, education, age and gender, as well as infrastructure, products and services affect how the internet is used and accessed. Comprised of six parts, the first section examines theories of the digital divide, and then looks in turn at: • Highly developed nations and regions (including the USA, the EU and Japan); • Emerging large powers (Brazil, Russia, India, China); • Eastern European countries (Estonia, Romania, Serbia); • Arab and Middle Eastern nations (Egypt, Iran, Israel); • Under-studied areas (East and Central Asia, Latin America, and sub-Saharan Africa). -
Internet Research in Psychology
PS66CH33-Gosling ARI 19 November 2014 13:50 Internet Research in Psychology Samuel D. Gosling1 and Winter Mason2 1Department of Psychology, University of Texas, Austin, Texas 78712; email: [email protected] 2Stevens Institute of Technology, Hoboken, New Jersey 07030; email: [email protected] Annu. Rev. Psychol. 2015. 66:877–902 Keywords First published online as a Review in Advance on Internet research, online research September 22, 2014 The Annual Review of Psychology is online at Abstract psych.annualreviews.org Today the Internet plays a role in the lives of nearly 40% of the world’s pop- This article’s doi: ulation, and it is becoming increasingly entwined in daily life. This growing 10.1146/annurev-psych-010814-015321 Annu. Rev. Psychol. 2015.66:877-902. Downloaded from www.annualreviews.org presence is transforming psychological science in terms of the topics studied Access provided by University of British Columbia on 01/01/21. For personal use only. Copyright c 2015 by Annual Reviews. and the methods used. We provide an overview of the literature, consid- All rights reserved ering three broad domains of research: translational (implementing tradi- tional methods online; e.g., surveys), phenomenological (topics spawned or mediated by the Internet; e.g., cyberbullying), and novel (new ways to study existing topics; e.g., rumors). We discuss issues (e.g., sampling, ethics) that arise when doing research online and point to emerging opportunities (e.g., smartphone sensing). Psychological research on the Internet comes with new challenges, but the opportunities far outweigh the costs. By integrating the Internet, psychological research has the ability to reach large, diverse samples and collect data on actual behaviors, which will ultimately increase the impact of psychological research on society. -
Digital Citizenship Education
Internet Research Ethics: Digital Citizenship Education Internet Research Ethics: Digital Citizenship Education by Tohid Moradi Sheykhjan Ph.D. Scholar in Education University of Kerala Paper Presented at Seminar on New Perspectives in Research Organized by Department of Education, University of Kerala Venue Seminar Hall, Department of Education, University of Kerala, Thycaud, Thiruvananthapuram, Kerala, India 17th - 18th November, 2017 0 Internet Research Ethics: Digital Citizenship Education Internet Research Ethics: Digital Citizenship Education Tohid Moradi Sheykhjan PhD. Scholar in Education, University of Kerala Email: [email protected] Abstract Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of knowledge. Education has not remained detached from this revolution. Ethical questions in relation to technology encompass a wide range of topics, including privacy, neutrality, the digital divide, cybercrime, and transparency. In a growing digital society, digital citizens recognize and value the rights, responsibilities and opportunities of living, learning and working in an interconnected digital world, and they engage in safe, legal and ethical behaviors. Too often we see technology users misuse and abuse technology because they are unaware of -
Guidelines for Internet Research with Human Subjects
Liberty University Institutional Review Board Guidelines for Internet Research with Human Subjects The Internet has become increasingly prominent as a research tool although specific regulations for Internet research compliance are currently only in their early developmental stages. In the absence of rules and policies, researchers and IRBs must use their sense of ethical empathy to adequately protect the rights and welfare of human subjects to guide research design and execution. Information provided by the Internet usually includes, but is not limited to, email, websites and bulletin boards. Generally, Internet-based research should be subject to the same ethical principles as more traditional research with human subjects. Beneficence, justice and respect for persons are paramount. Internet researchers have moral obligations to respect and protect human beings as autonomous agents and thereby to protect human dignity (Ess, 2002). Briefly, Internet researchers must: Do no harm, Protect the anonymity of subjects, Protect the confidentiality of all research data tied to the identity of subjects, Obtain informed consent from subjects. Public or Private Space? The Internet is generally considered a public domain, easily accessible to anyone, yet many Internet community members regard their online interactions to be private conversations embedded in public space. Researchers must be sensitive to the issue that whether a space is public or private is relative to the definitions of those who occupy it (Cavanagh, 1999) and be aware of the implications resulting for the informed consent process. Psychological harm can result when members are unaware that they are being analyzed and when the results of the study are published in a way that allows the participants to identify themselves and their community.