A Case Study on the Rise and Fall of Yik Yak
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
The Public Square Project
THE PUBLIC SQUARE PROJECT The case for building public digital infrastructure to support our community and our democracy With majority support from Australians on curbing Facebook’s influence and role on our civic spaces, it is time to create an alternative social network that serves the public interest Research report Jordan Guiao Peter Lewis CONTENTS 2 // SUMMARY 3 // INTRODUCTION 5 // REIMAGINING THE PUBLIC SQUARE 10 // A NEW PUBLIC DIGITAL INFRASTRUCTURE 12 // CONSIDERATIONS IN BUILDING PUBLIC DIGITAL INFRASTRUCTURE 17 // TOWARDS THE FUTURE 19 // CONCLUSION 20 // APPENDIX — ALTERNATE SOCIAL NETWORKS OVER TIME The public square is a place where citizens come together, exchange ideas and mediate differences. It has its origins in the physical town square, where a community can gather in a central and open public space. As towns grew and technology progressed, the public square has become an anchor of democracy, with civic features like public broadcasting creating a space between the commercial, the personal and the government that helps anchor communities in shared understanding. 1 | SUMMARY In recent times, online platforms like Facebook In re-imagining a new public square, this paper have usurped core aspects of what we expect from proposes an incremental evolution of the Australian a public square. However, Facebook’s surveillance public broadcaster, centred around principles business model and engagement-at-all-costs developed by John Reith, the creator of public algorithm is designed to promote commercial rather broadcasting, of an independent, but publicly-funded than civic objectives, creating a more divided and entity with a remit to ‘inform, educate and entertain’ distorted public discourse. -
Thesis Reference
Thesis Context-aware multifactor authentication for the augmented human HUSEYNOV, Emin Abstract Multi-factor authentication is currently one of the de-facto standards for systems requiring strong security. In most of the cases, multi-factor authentication is rather complex and not very user-friendly, as it requires additional steps as far as end-users are concerned: e.g. with two-factor authentication, in addition to entering a username and a password (usually considered as a first factor), users need to manually enter an additional code (second factor) that they either receive by text messages, look up in a previously printed list of passwords or generated by a hardware or software token. An extensive review of potential security risks that multi-factor authentication is capable of mitigating is a significant part of this thesis. The thesis will review phishing as one of the biggest end-user targeted attacks and describe the security risks as well as modern methods of such attacks that can potentially lead to theft of sensitive data, such as user credentials, passwords and/or credit card information. The main purpose of this research is to review existing multi-factor authentication systems, primarily in corporate [...] Reference HUSEYNOV, Emin. Context-aware multifactor authentication for the augmented human. Thèse de doctorat : Univ. Genève, 2020, no. SdS 149 URN : urn:nbn:ch:unige-1358289 DOI : 10.13097/archive-ouverte/unige:135828 Available at: http://archive-ouverte.unige.ch/unige:135828 Disclaimer: layout of this document may differ from the published version. 1 / 1 Context-Aware Multi- factor Authentication for the Augmented Human THÈSE présentée à la Faculté des sciences de la société de l’Université de Genève par Emin Huseynov sous la codirection de Dr. -
Shepherd: Enabling Large-Scale Scanning of Websites After Social Single Sign-On
Open University of the Netherlands faculty of Management, Science & Technology Bachelor Computer Science Shepherd: Enabling Large-Scale Scanning of Websites after Social Single Sign-on Chair(wo)man: Authors: prof. dr. Tanja Vos Jelle Kalkman Supervisors: Alan Verresen dr. ir. Hugo Jonker Benjamin Krumnow, MSc. Presentation date: 02-08-2019 July 31, 2019 Course code: IB9906 Abstract Session security for web applications should keep users safe from session hijacking and ensure privacy and security in their online lives. A substantial part of their online lives are hidden behind a login field. To study how secure and private their online lives are, it is needed to do this from the same, authenticated, perspective. However, for a large-scale study, this would require us to automate authentication and account creation for a large number of web applications. This has proven to be a major challenge because web application can roll out countermea- sures against automated account creation, valid credentials should be used, the web is very heterogeneous, and several ethical concerns need to be addressed. We found that we could leverage Single Sign-On, such as signing in with Facebook or Google, to automate authentication for a large amount of websites. At least 6.3 % of the web applications in the daily Alexa top 1M lists offer the option to use Single Sign-On to authenticate and in 56 % of the cases this is sufficient to reach the authenticated state. We extended the Shepherd framework to increase the reach of research on session security by adding modules to automatically detect if a web application offers Social Single Sign-On and, if so, the ability to automatically authenticate for that web application. -
The Virtual Bathroom Stall: Solving the Headache of Geo-Based Anonymous Message Applications on University Campuses
\\jciprod01\productn\G\GWN\85-3\GWN305.txt unknown Seq: 1 7-JUL-17 8:22 NOTE The Virtual Bathroom Stall: Solving the Headache of Geo-Based Anonymous Message Applications on University Campuses Thomas C. Gallagher, Jr.* ABSTRACT Since its launch in late 2013, Yik Yak, a location-based application that permits users to post on local, virtual message boards targeted at university campuses, has become a massive headache for universities who are responsi- ble, under Department of Education guidelines, for maintaining a safe envi- ronment for their students. These message boards have become a breeding ground for personal attacks, sexual harassment, bigotry, and threats of mass violence, which have caused huge disruptions to educational environments. Yik Yak, however, is not responsible for the messages being posted; it is re- sponsible only for creating and placing virtual bulletin boards on college cam- puses, which the institutions have no ability to regulate. Through guidance letters issued over the last five years, the Department of Education has warned universities that they may be responsible for adequately responding to inci- dents and environments of harassment that occur on their campuses, regard- less of the medium through which the harassment occurs. Because Yik Yak’s Global Positioning System (“GPS”) located virtual message boards are no different than if someone walked onto the school grounds and placed a mes- sage board on the physical campus without the school’s permission, this Note proposes universities use the traditional property law action of trespass to ex- clude the Yik Yak application from campuses. * J.D., 2017, The George Washington University Law School. -
Campus Safety V. Freedom of Speech: an Evaluation of University Responses to Problematic Speech on Anonymous Social Media Susan Dumont
Journal of Business & Technology Law Volume 11 | Issue 2 Article 7 Campus Safety v. Freedom of Speech: An Evaluation of University Responses to Problematic Speech on Anonymous Social Media Susan DuMont Follow this and additional works at: http://digitalcommons.law.umaryland.edu/jbtl Part of the First Amendment Commons Recommended Citation Susan DuMont, Campus Safety v. Freedom of Speech: An Evaluation of University Responses to Problematic Speech on Anonymous Social Media, 11 J. Bus. & Tech. L. 239 (2016) Available at: http://digitalcommons.law.umaryland.edu/jbtl/vol11/iss2/7 This Notes & Comments is brought to you for free and open access by the Academic Journals at DigitalCommons@UM Carey Law. It has been accepted for inclusion in Journal of Business & Technology Law by an authorized editor of DigitalCommons@UM Carey Law. For more information, please contact [email protected]. Susan DuMont* Campus Safety v. Freedom of Speech: An Evaluation of University Responses to Problematic Speech on Anonymous Social Media Introduction Social media impacts how college students interact, and universities are struggling with the challenges presented by problematic speech on these sites. Platforms that encourage unidentified posting, such as Yik Yak and former gossip site JuicyCampus.com, significantly increase the potential for real harm through problematic speech, including hate speech, threats of violence, sexual harassment, and other forms of damaging, anonymous speech.1 University administrators are forced to evaluate options for responding to problematic speech on anonymous social media sites.2 Given the current culture of treating the internet as the “Wild West,” it is understandable why universities may choose to ignore the sites and why response has been limited.3 On the other end of © 2016 Susan DuMont * J.D., University of Maryland Francis King Carey School of Law, 2016; M.A., University of Delaware, 2010; B.A., Lake Forest College, 2007. -
Social Media and Democracy : the State of the Field, Prospects for Reform
Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Downloaded from https://www.cambridge.org/core. IP address: 170.106.33.19, on 26 Sep 2021 at 08:20:02, subject to the Cambridge Core terms of use, available at https://www.cambridge.org/core/terms. https://www.cambridge.org/core/product/E79E2BBF03C18C3A56A5CC393698F117 Social Media and Democracy Over the last five years, widespread concern about the effects of social media on democracy has led to an explosion in research from different disciplines and corners of academia. This book is the first of its kind to take stock of this emerging multi-disciplinary field by synthesizing what we know, identifying what we do not know and obstacles to future research, and charting a course for the future inquiry. Chapters by leading scholars cover major topics – from disinformation to hate speech to political advertising – and situate recent developments in the context of key policy questions. In addition, the book canvasses existing reform proposals in order to address widely perceived threats that social media poses to democracy. This title is also available as Open Access on Cambridge Core. Nathaniel Persily is the James B. McClatchy Professor of Law at Stanford Law School and the Co-Director of the Stanford Cyber Policy Center and Stanford Project on Democracy and the Internet. His scholarship focuses on the law and technology of democracy. -
Understanding Social Media: Tweets, Yaks, and the Social Web in College Health
Understanding Social Media: Tweets, Yaks, and the Social Web in College Health #ACHA2016 Tammy Ostroski, DNP, FNP In collaboration with: Rita Wermers, MSN, ANP James Wermers, MS OVERVIEW PART I ● Describe the current state of social media use in health PART II ● Explain the need for college health professionals to critically evaluate and deploy social media PART III ● Discuss how at least 4 different social media platforms can be engaged and deployed by college health professionals PART I SOCIAL MEDIA BOYD AND ELLISON (2008) ● [W]eb-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. (p. 211). RECENT EXPANSION ● Movement away from individual profiles and towards collaborative identity EVOLUTION WEB 1.0 ● Static ● "Archive of data" ● Taxonomy WEB 2.0 ● Collaborative ● "Transparent mechanism" ● Folksonomy WEB 2.5 ● Collectivist IN HEALTH US CONSUMERS ● Utilize platforms like WebMD, Mayo Clinic and Google for health information (Web 1.0) ● Social media (Web 2.0) consumption continues to increase ● New platforms HEALTH CARE PROVIDERS ● Case studies demonstrating traditional forms of efficacy. ● Ensure access to high quality information ● Goal to “empower” patients - Health Promotion ● Often see pitfalls rather than opportunities IN HEALTH (2) COLLEGE STUDENTS ● Utilize social media and social networks to guide personal health behaviors ● Targeted as early adopters COLLEGE HEALTH PROVIDERS ● Share many of the concerns non-college counterparts ● Seek to meet the unique needs of college students ● Balance between use of innovated technologies and risks related to patient privacy PART II LIT. -
Second Life Mobile Application
Second Life Mobile Application Amharic and unfurred Pepe always reinform crustily and fertilise his athelings. Lynn remains chalcographical: masculinelyshe clanks her or swelterswurley acidify foursquare. too lexically? Wildon scurries bonnily while warmed-over Archibold terrified Second Life iOS companion app mini update Inara Pey Living in. Samsung Unveils Mobile Application for asset Life N4G. Second Chance it it will trade response in give pepper a log life Customers. The Apple App Store was sloppy second-largest app store has almost 196 million available apps for iOS Whereas the exact problem of apps may. As all know already Linden Lab is currently working post a brand new gorgeous Life mobile companion app for iOS and for Android users These. Comments system in second life includes policies apply to catch a central repository. Sony gives your PS4 a glad life slinging a PS5 to another group of. Best quality Taking App Organize Your Notes with Evernote. Food lion app com Mobile App Coupons download the app With our. 1 Second Everyday is a video diary that makes it easy some take this day-to-day moments and failure a meaningful movie kept your made It's can home. Contract to doing scripting tasks within Second time Open Sim and InWorldz. How calm are lindens in children Life? Vollee Debuts Second life on Mobile Business Wire. Worship Team App Second imposing Church. PREMIER Bank Secured Credit Card gives you the opportunity toe get in second chance you supplement with. Second Life eLearning Learning. Who are ratings calculated location to it easy it overlap really difficult to second life mobile application had such as linden lab had hoped it and receiving health. -
Social Media
Social Media Social media has grown into an entrenched part of many middle school students’ daily lives. While the explosion of social media apps has many positive outcomes that increase communication and provide a mechanism for both young and old to feel connected, it has also negatively increased venues for teasing, ridicule and bullying to occur. Recently, we have noticed and heard from both students and parents that they are observing a higher level than usual of mean behavior occurring on social media. Student Council members have reported that mean comments tend to go in cycles usually linked to an issue or even that occurred outside of school. We wanted to share with parents what occurs here at school to educate our students and to address issues as they arise or impact the school learning environment. The topic of digital citizenship is taught in multiple courses. Social media is specifically covered in our health curriculum. Additionally, we began the year with a presentation from a representative, Miracruz Lora, from the Essex County District Attorney Kevin Burke’s office; in January the Tri- Town Council presented the film Screenagers followed by a panel discussion by local school and community members. Our 7th grade students also had an opportunity to view the movie and discuss the impacts of it in health class. We encourage any adult that views a mean situation occurring on their child’s social media to take a screen shot and report it to Mr. Monagle, our Assistant Principal. We can’t view much of what takes place on social media, so any evidence that allows us to view the comments is helpful to an investigation. -
Do You Know What Apps Your Kids Are Using?
ChatRoulette What it is: A video chat site that randomly Do you know matches you up with someone around the globe to have a video chat. what apps Why it’s bad: It’s very popular for cybersex and pornography, and it’s not uncommon to be randomly matched up with a chat partner who’s completely nude in your kids are front of their webcam. There’s nothing to stop the person you are chatting with from recording the video chat and posting About us it elsewhere. The primary goal of the Children’s using? Advocacy Center is to provide Social Media Checklist for Parents children and families professional • Talk openly and often about online safety with and compassionate care in order your kids to minimize and reduce the trauma often experienced by children who • Install safety monitoring software on all devices are possible victims of child abuse. By • Limit screen time and designate specific areas for conducting a thorough evaluation of the Internet child we are best able to identify his or her needs and facilitate the provision of • Establish clear ground rules & safety principles the services needed. • Stay up to date on social media & online trends Contact Us And don’t forget: Children’s Advocacy Center • The apps that are hidden photos—calculator and 830 Pennsylvania Ave. other common apps can be a disguise for hidden Charleston, WV 25302 photos or content. (304) 388-2391 • Add somewhere, check privacy settings on all social camc.org/cac media apps kids are using. • If you have an app that lets family know where each other are, use it. -
Experimental Analysis of Popular Anonymous, Ephemeral, and End-To-End Encrypted Apps∗
Experimental Analysis of Popular Anonymous, Ephemeral, and End-to-End Encrypted Apps∗ Lucky Onwuzurike Emiliano De Cristofaro University College London University College London [email protected] [email protected] Abstract—As social networking takes to the mobile world, Highlights of our findings include that “anonymous” social smartphone apps provide users with ever-changing ways to network apps Whisper and Yik Yak actually identify users interact with each other. Over the past couple of years, an with persistent distinct user IDs. Users’ (previous) activities increasing number of apps have entered the market offering are restored to their device after uninstalling and reinstalling end-to-end encryption, self-destructing messages, or some degree the apps, and information collected by these apps could be of anonymity. However, little work thus far has examined the used to de-anonymize them. We also find that the ephemeral- properties they offer. To this end, this paper presents a taxonomy of 18 of these apps: we first look at the features they promise in messaging app Snapchat does not always delete messages from their appeal to broaden their reach and focus on 8 of the more its servers – in fact, “expired” chat messages are included in popular ones. We present a technical evaluation, based on static packets sent to the client. Then, we report that all actions and dynamic analysis, and identify a number of gaps between performed by a user on Frankly Chat can be observed from the claims and reality of their promises. the request URL, which is actually transmitted in the clear. -
Yik Yak User Tracked, Arrested After Evacuation
Have study abroad photos? This week's online poll question: Submit photos to What is your favorite social media? [email protected] What's up with Yik Yak? Check out p. 12 theVolume 116, Issue | 10.1.14 antelope | www.unkantelope.com Yik Yak user tracked, arrested after evacuation BY AUSTIN KOELLER Buffalo County authorities had been News/Featue Editor monitoring social media primarily because there had been other threats observed – Students, faculty and staff were forced some vaguer threats that have happened to evacuate the Calvin T. Ryan Library and earlier, said Kelly Bartling, assistant vice adjacent Mitchell Center last Wednesday chancellor for communications and com- morning after a threat was posted on a so- munity relations. cial media app. Bartling said that after seeing the On Thursday, Matthew Skinner, a threat, Buffalo County Authorities called freshman from Ogallala, was identified UNK officials who took appropriate ac- and booked into the Buffalo County Jail on tions. According to the story in the Kear- charges of threatened use of explosives, a ney Hub, the suspect made the threats to- Class IV felony. ward all three buildings. It was reported by the Kearney Hub As a precaution, the library and Mitch- Saturday that about 3 p.m. Tuesday a bomb ell Center were evacuated shortly after that threat was made on the Yik Yak social net- threat was received. While the investiga- work against a residence hall at UNK. At tion during the evacuation turned up noth- Photo by Ashylnn Torres that time police swept the building as a ing suspicious, UNK Communications Last Wednesday, Sept.