Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis

Size: px
Start display at page:

Download "Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis"

Transcription

1 Exploiting the dark triad for national defense capabilities Dimitris Gritzalis May 2015

2 Exploiting the dark triad for national defense capabilities Professor Dimitris A. Gritzalis Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Dept. of Informatics, Athens University of Economics & Business

3 What is all about? The problem: An insider as a severe threat to na.onal defense The theory: Narcissists tend to turn insiders The defense: Reveal narcissists The data source: Online Social Networks and the Web 2.0 The tool: NEREUS Framework

4 The problem: The Insider threat Insider threat was the top priority to protect for 2014 Insiders are persons who: - are legi.mately given access rights to a Cri.cal Infrastructure - misuse their privileges and violate security policy Insiders consist the top source of data breaches Source: CERT, Cyber Security Watch Survey: How Bad Is the Threat?, Carnegie Mellon University, USA, 2014.

5 The theory: The Dark Triad Dark Triad personality traits Ø Narcissism: Inflated self- view and focus on themselves Ø Machiavellianism: Manipula.ve personality Ø Psychopathy: High impulsivity and thrill- seeking, along with low empathy and low anxiety Dark Triad traits are used to extend Five Factor Model (FFM) to represent socially malevolent behavior The wealth of data provided by OSN users has opened the door to a new way of analyzing personality Ability to exploit narcissism personality trait Ø Narcissism trait is also examined by Shaw and the FBI Sources: M. Maasberg, J. Warren, N. Beebe, The Dark Side of the Insider: Detec.ng the Insider Threat through examina.on of Dark Triad personality traits. Federal Bureau of Inves.ga.on, The insider threat: An introduc=on to detec=ng and deterring an insider spy, USA, E. Shaw, K. Ruby, J. Post, The insider threat to informa.on systems: The psychology of the dangerous insider, Security Awareness Bulle=n, vol. 2, no. 98, pp

6 The defense: Open Source Intelligence Open Source Intelligence (OSINT) is produced from publicly available informa.on, which is: Ø Collected, exploited and disseminated in a Amely manner Ø Offered to an appropriate audience Ø Used for the purpose of addressing a specific intelligence requirement Publicly available informa.on refers to (not only): Ø Tradi.onal media (e.g. television, newspapers, radio, magazines, etc.) Ø Web- based communi.es (e.g. social networking sites, blogs, etc.) Ø Public data (e.g. government reports, official data, public hearings, etc.) Ø Amateur observa.on/repor.ng (e.g. amateur spoaers, radio monitors, etc.) OSINT defined by US Dept. of Defense (Public Law , Sec. 931,Na.onal Defense Authoriza.on Act for Fiscal Year 2006). SOCMINT is produced from Online Social Networks & the Web 2.0

7 The data source: Web 2.0 & Online Social Networks Source: hap://socialmediatoday.com/

8 The tool: The NEREUS Framework NEREUS Framework OSN: TwiPer Tools used for the open data analysis Science Informa.cs Sociology Psychology Theory Graph Theory Content Analysis Theory of Planned Behavior Social Learning Theory ApplicaAon: Insider threat detec.on/predic.on, influen.al users detec.on, means of communica.on evalua.on, etc.

9 The NEREUS Framework in a nutshell

10 The dataset ualized Focus on a Greek TwiPer community: Ø Context sensi.ve research Ø U.lize ethnological features rooted in locality Ø Extract and analyze results Analysis of content and measures of user influence and usage intensity User Categories: Follower, Following, Retweeter Graph: Ø Each user is a node Ø Every interac.on is a directed edge fully crawled users (personal & sta.s.cal data) Ø Name, ID, personal descrip.on, URL, language, geoloca.on, profile state, lists, # of following/followers, tweets, # of favorites, # of men.ons, # of retweets TwiPer (Greece, ) connec.ons among them

11 Graph theoreacal and content analysis Strongly connected components: Ø There exists 1 large component ( nodes connected to each other) and several smaller ones Node Loneliness: Ø 99% of users connected to someone Small World phenomenon: Ø Every user lies <6 hops away from anyone else Indegree DistribuAon: Ø # of users following each user Ø Average 13.2 followers/user Outdegree DistribuAon: Ø # of users each user follows Ø Average 11 followers/user Usage Intensity DistribuAon: Weighted aggrega.on of: {# of followers, # of followings, tweets, retweets, men.ons, favorites, lists} Important cluster of users

12 Conclusions ü Web 2.0 produces vast amounts of crawlable informa.on and OSINT can transform it into intelligence. ü OSINT can assist in detec.ng the Dark Triad traits (narcissis.c behavior, etc.). ü OSINT can help in predic.ng insiders, in predic.ng delinquent behavior, and in enhancing na.onal defense. ü OSINT intrusive nature dictates use for specific purposes, according to law.

13 References 1. Gritzalis D., Stavrou V., Kandias M., Stergiopoulos G., Insider Threat: Enhancing BPM through Social Media, in Proc. of the 6 th IFIP Interna=onal Conference on New Technologies, Mobility and Security, IEEE Press, Gritzalis D., Kandias M., Stavrou V., Mitrou L., "History of Informa.on: The case of Privacy and Security in Social Media", in Proc. of the History of Informa=on Conference, Law Library Publica.ons, Gritzalis D., Insider threat preven.on through Open Source Intelligence based on Online Social Networks, Keynote address, 13 th European Conference on Cyber Warfare and Security (ECCWS- 2014), Greece, Kandias M., Mylonas A., Virvilis N., Theoharidou M., Gritzalis D., An Insider Threat Predic.on Model, in Proc. of the 7 th Interna=onal Conference on Trust, Privacy and Security in Digital Business, pp , Springer (LNCS 6264), Spain, Kandias M., Galbogini K., Mitrou L., Gritzalis D., "Insiders trapped in the mirror reveal themselves in social media", in Proc. of the 7 th Interna=onal Conference on Network and System Security, pp , Springer, Kandias M., Mitrou L., Stavrou V., Gritzalis D., Which side are you on? A new Panop.con vs. privacy, in Proc. of the 10 th Interna=onal Conference on Security and Cryptography, pp , ScitecPress, Kandias M., Stavrou V., Bozovic N., Mitrou L., Gritzalis D., "Can we trust this user? Predic.ng insider s attude via YouTube usage profiling", in Proc. of 10 th IEEE Interna=onal Conference on Autonomic and Trusted Compu=ng, pp , IEEE Press, Kandias M., Virvilis N., Gritzalis D., "The Insider threat in Cloud Compu.ng", in Proc. of the 6 th Interna=onal Conference on Cri=cal Infrastructure Security, pp , Springer, Kandias M., Stavrou V., Bosovic N., Gritzalis D., Proac.ve insider threat detec.on through social media: The YouTube case, in Proc. of the 12 th Workshop on Privacy in the Electronic Society, pp , ACM, Germany, Kandias M., Mitrou L., Stavrou V., Gritzalis D., "YouTube user and usage profiling: Stories of poli.cal horror and security success", in e- Business and Telecommunica=ons, Springer, Kotzanikolaou P., Theoharidou M., Gritzalis D., Cascading effects of common- cause failures on Cri.cal Infrastructures, in Proc. of the 7 th IFIP Interna=onal Conference on Cri=cal Infrastructure Protec=on, pp , Springer, USA, Mitrou L., Kandias M., Stavrou V., Gritzalis D., "Social media profiling: A Panop.con or Omniop.con tool?", in Proc. of the 6 th Conference of the Surveillance Studies Network, Spain, Pipyros K., Mitrou L., Gritzalis D., Apostolopoulos T., "A cyber aaack evalua.on methodology", in Proc. of the 13 th European Conference on Cyber Warfare and Security, Athens, Theoharidou M., Kotzanikolaou P., Gritzalis D., Risk- based cri.cality analysis", in Proc. of the 3 rd IFIP Interna=onal Conference on Cri=cal Infrastruc- ture Protec=on, Springer, USA, 2009.

Events and Memes in Media- rich Social Informa7on Networks

Events and Memes in Media- rich Social Informa7on Networks Events and Memes in Media- rich Social Informa7on Networks Lexing Xie Computer Science Australian Na7onal University EBMIP Workshop, Oct 2013 2 Internet Memes Quotes Tags Links #occupy hqp://y2u.be/_oblgsz8ssm

More information

Introduc)on to Nexalogy Wikileaks and Extremism case studies

Introduc)on to Nexalogy Wikileaks and Extremism case studies Introduc)on to Nexalogy Wikileaks and Extremism case studies The New Facts of Life 3.5+ billion Pieces of content (links, news stories, blog posts) posted to facebook weekly 1.14 million Average tweets

More information

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang

More information

Global Ci)zens and the U.S. Security Surveillance Dragnet. Center for Democracy & Technology Webinar 18 July 2013

Global Ci)zens and the U.S. Security Surveillance Dragnet. Center for Democracy & Technology Webinar 18 July 2013 Global Ci)zens and the U.S. Security Surveillance Dragnet Center for Democracy & Technology Webinar 18 July 2013 Purpose of Webinar Explain laws under which the U.S. Na)onal Security Agency conducts surveillance

More information

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis

Secure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,

More information

Secure and Reliable Electronic Voting. Dimitris Gritzalis

Secure and Reliable Electronic Voting. Dimitris Gritzalis Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote

More information

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis

Secure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris

More information

Safer internet evening. 11 February 2014

Safer internet evening. 11 February 2014 Safer internet evening 11 February 2014 Mr Martin and Mrs Ramsay Awareness raising session for Parents and Carers Why are we here? Social Media 2011 Money management Communica>on skills Confidence Learning

More information

Professional Issues. Data Protec1on (Bo4, Ch 13)

Professional Issues. Data Protec1on (Bo4, Ch 13) Professional Issues Data Protec1on (Bo4, Ch 13) Overview Overview of the 1998 Data Protec1on Act (DPA) Defini1ons Changes since 1984 Act Sensi1ve Personal Data & Consent The eight principles Freedom of

More information

EUROPEAN YOUTH Report

EUROPEAN YOUTH Report EUROPEAN YOUTH - 1 - Report Contents 1. Study Design (p. 3-4) 2. Perception Of The European Union (p. 5-) 3. Political attitudes (p. 21-45) 4. Media Usage (p. 4-54) 5. Outlook Into The Future (p. 55-).

More information

IEEE ComSoc Quantum Communica/ons and Informa/on Technology - ETC (QCIT-ETC)

IEEE ComSoc Quantum Communica/ons and Informa/on Technology - ETC (QCIT-ETC) IEEE ComSoc Quantum Communica/ons and Informa/on Technology - ETC (QCIT-ETC) Mee/ng at Globecom 2016 Place/Floor/Room: Washington Hilton/Terrace/Fairchild East Date/Time: Wednesday Dec. 7, 2016, 2:00pm

More information

Functional Requirements for a Secure Electronic Voting System

Functional Requirements for a Secure Electronic Voting System Functional Requirements for a Secure Electronic Voting System Spyros IKONOMOPOULOS 1, Costas LAMBRINOUDAKIS 1, Dimitris GRITZALIS 2, Spyros KOKOLAKIS 1, Kostas VASSILIOU 1 1 Dept. of Information and Communication

More information

Social Networking in Many Forms

Social Networking in Many Forms for Independent School Admissions Emily H.L. Surovick Director of Lower School Admission, Chestnut Hill Academy Vincent H. Valenzuela Director of Admission, Chestnut Hill Academy in Many Forms Blogging

More information

Enhancing efficiency in remittance markets in Latin America and the Caribbean

Enhancing efficiency in remittance markets in Latin America and the Caribbean Enhancing efficiency in remittance markets in Latin America and the Caribbean Updates on the CEMLA-IDB-WB Remittances program Global Payments Week 2010 Amsterdam, October 22, 2010 Outline Importance of

More information

Canadian Museums Associa.on EDUCATIONAL SESSIONS. The Global Role of Museums in the Development of Civil Society

Canadian Museums Associa.on EDUCATIONAL SESSIONS. The Global Role of Museums in the Development of Civil Society Mar.n Segger Canadian Museums Associa.on EDUCATIONAL SESSIONS The Global Role of Museums in the Development of Civil Society Moderator: Mar.n Segger, President, Commonwealth Associa6on of Museums (CAM),

More information

Monday, March 4, 13 1

Monday, March 4, 13 1 1 2 Using Social Media to Achieve Goals Networking Your Way to Employment Friday, November 18, 2011 3 LinkedIn Establish your profile, resume, & professional picture Incorporate all keywords a recruiter

More information

HANDS ACROSS BORDERS. An International Workshop on. Alterna(ve Mechanisms to Establish and Govern Transboundary Conserva(on Ini(a(ves

HANDS ACROSS BORDERS. An International Workshop on. Alterna(ve Mechanisms to Establish and Govern Transboundary Conserva(on Ini(a(ves HANDS ACROSS BORDERS An International Workshop on Transboundary Conservation Alterna(ve Mechanisms to Establish and Govern Transboundary Conserva(on Ini(a(ves Michael Schoon School of Sustainability Arizona

More information

Computational challenges in analyzing and moderating online social discussions

Computational challenges in analyzing and moderating online social discussions Computational challenges in analyzing and moderating online social discussions Aristides Gionis Department of Computer Science Aalto University Machine learning coffee seminar Oct 23, 2017 social media

More information

Social. Media. in prevention efforts. Lyndsey Hawkins. Bradley University

Social. Media. in prevention efforts. Lyndsey Hawkins. Bradley University Social in prevention efforts Media Lyndsey Hawkins Bradley University why me? BA in Communications PR MA in Human Service Admin. CADP I AM NOT AN EXPERT! why we are here today: Define social media and

More information

LOCAL MEDIA APP TRENDS

LOCAL MEDIA APP TRENDS LOCAL MEDIA APP TRENDS SUMMER 2013 Survey of Local Media App Users ABOUT THIS PROJECT EXECUTIVE SUMMARY Mobile moves incredibly fast. Keeping pace with both the technology and consumer expectations presents

More information

OUR PANELISTS. Linda Morrison L&D Academy Administrator Travelex. Be+y Mills L&D Manager Centra Health. Ma+ Hart L&OD Resource Officer Metropolitan

OUR PANELISTS. Linda Morrison L&D Academy Administrator Travelex. Be+y Mills L&D Manager Centra Health. Ma+ Hart L&OD Resource Officer Metropolitan REMINDERS Please post your ques5ons in the Ques5ons Box of the GoToWebinar Control Panel Audience polls will be conducted during this webinar A recording of this webinar will be made available a few days

More information

Women Without Borders: Gender and Informal Cross- Border Trade

Women Without Borders: Gender and Informal Cross- Border Trade Women Without Borders: Gender and Informal Cross- Border Trade Speakers: Lisabeth Meyers, Banyan Global Moderator: Sait Mboob, USAID Facilitator: Julie MacCartee, USAID Date: March 8, 2017 Sait Mboob,

More information

CSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers

CSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers CSCI 325: Distributed Systems Professor Sprenkle Objec?ves Course overview Overview of distributed systems Introduc?on to reading research papers Sept 8, 2017 Sprenkle - CSCI 325 2 1 Distributed Systems?

More information

ANNUAL SURVEY REPORT: ARMENIA

ANNUAL SURVEY REPORT: ARMENIA ANNUAL SURVEY REPORT: ARMENIA 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 ANNUAL SURVEY REPORT,

More information

Decentralised solutions for renewable energies and water in developing countries

Decentralised solutions for renewable energies and water in developing countries Decentralised solutions for renewable energies and water in developing countries Energy and Water Solu0ons in sub- Saharan Africa 16. - 17. October 2014 Radolfzell at Lake Constance, Germany Dr. Julia

More information

Stacy L. Schaffer Founder, 31:8 Project

Stacy L. Schaffer Founder, 31:8 Project Stacy L. Schaffer Founder, 31:8 Project Be the Voice: How healthcare providers can make a difference in the fight against human trafficking. Objec;ves Define human trafficking and the different categories

More information

Fundamentals of National Migration Governance:

Fundamentals of National Migration Governance: Fundamentals of National Migration Governance: IOM s approach, programs and tools Md. Shahidul Haque Director, Interna6onal Coopera6on and Partnerships, IOM Conference on Mainstreaming Migra0on into Development

More information

Are Friends Overrated? A Study for the Social News Aggregator Digg.com

Are Friends Overrated? A Study for the Social News Aggregator Digg.com Are Friends Overrated? A Study for the Social News Aggregator Digg.com Chris>an Doerr, Norbert Blenn, Siyu Tang, Piet Van Mieghem TU DelG, Mekelweg 4, 2628CD DelG, The Netherlands {C.Doerr, N.Blenn, S.Tang,

More information

The language for most tablet questions was customized based on whether the respondent said they had an ipad or another type of tablet computer.

The language for most tablet questions was customized based on whether the respondent said they had an ipad or another type of tablet computer. PEW RESEARCH CENTER S PROJECT FOR EXCELLENCE IN JOURNALISM IN COLLABORATION WITH THE ECONOMIST GROUP Tablet News Web Survey September 6-19, N=300 tablet news users The language for most tablet questions

More information

Tackling Police Corrup1on in South Africa. 21 November 2013 Gareth Newham Ins1tute for Security Studies

Tackling Police Corrup1on in South Africa. 21 November 2013 Gareth Newham Ins1tute for Security Studies Tackling Police Corrup1on in South Africa 21 November 2013 Gareth Newham Ins1tute for Security Studies Overview Corrup'on in SA Police Corrup'on as an occupa'onal hazard Recommenda'ons SA An1- Corrup1on

More information

Reputation-Based Trust Management (extended abstract)

Reputation-Based Trust Management (extended abstract) Reputation-Based Trust Management (extended abstract) Vitaly Shmatikov and Carolyn Talcott Computer Science Laboratory, SRI International, Menlo Park, CA 94025 USA shmat,clt @csl.sri.com Abstract. We propose

More information

The Buddy System. A Distributed Reputation System Based On Social Structure 1

The Buddy System. A Distributed Reputation System Based On Social Structure 1 The Buddy System A Distributed Reputation System Based On Social Structure 1 Stefan Fähnrich, Philipp Obreiter, Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe

More information

Experiments on Data Preprocessing of Persian Blog Networks

Experiments on Data Preprocessing of Persian Blog Networks Experiments on Data Preprocessing of Persian Blog Networks Zeinab Borhani-Fard School of Computer Engineering University of Qom Qom, Iran Behrouz Minaie-Bidgoli School of Computer Engineering Iran University

More information

ANNUAL SECURITY & FIRE SAFETY REPORT

ANNUAL SECURITY & FIRE SAFETY REPORT October 1, 215 ANNUAL SECURITY & FIRE SAFETY Introduction to the Report We urge members of the University community to use this report as a guide for safe prac7ces on and off- campus. The Department of

More information

The Pupitre System: A desk news system for the Parliamentary Meeting rooms

The Pupitre System: A desk news system for the Parliamentary Meeting rooms The Pupitre System: A desk news system for the Parliamentary Meeting rooms By Teddy Alfaro and Luis Armando González talfaro@bcn.cl lgonzalez@bcn.cl Library of Congress, Chile Abstract The Pupitre System

More information

Social Media based Analysis of Refugees in Turkey

Social Media based Analysis of Refugees in Turkey Social Media based Analysis of Refugees in Turkey Abdullah Bulbul, Cagri Kaplan, and Salah Haj Ismail Ankara Yildirim Beyazit University, Türkiye, abulbul@ybu.edu.tr http://ybu.edu.tr/abulbul Abstract.

More information

HDSE Summit #9. Keith G. Logan, Kutztown Univ. of PA

HDSE Summit #9. Keith G. Logan, Kutztown Univ. of PA HDSE Summit #9 Keith G. Logan, Kutztown Univ. of PA Homeland security is not just about terrorism and counterterrorism. It is an amalgam of several distinct yet interrelated areas that include the gathering

More information

Private Sponsorship in Refugee Resettlement. February 2017

Private Sponsorship in Refugee Resettlement. February 2017 Private Sponsorship in Refugee Resettlement February 2017 Canada s Refugee Programs Canada accepts Conven8on refugees and those in refugee-like situa8ons for humanitarian reasons, according to the following

More information

Immigra6on Basics. Stephanie Paver, Senior A)orney. 1. Department of Homeland Security (DHS)

Immigra6on Basics. Stephanie Paver, Senior A)orney. 1. Department of Homeland Security (DHS) Immigra6on Basics Stephanie Paver, Senior A)orney U.S. Immigra6on Agencies 1. Department of Homeland Security (DHS) U.S. Ci'zenship & Immigra'on Services (USCIS)- former INS Customs & Border Protec'on

More information

TREND MONITOR. Scenario analysis and trend monitoring.

TREND MONITOR. Scenario analysis and trend monitoring. TREND MONITOR Scenario analysis and trend monitoring www.babaconsulting.com babatrendmonitor.com 2 TRENDSPOTTING Ø Trends are the differential elements that allow to attribute an added value to market

More information

Polarisation in Political Twitter Conversations

Polarisation in Political Twitter Conversations Polarisation in Political Twitter Conversations David Gunnarsson Lorentzen, Swedish School of Library and Information Science, Borås, Sweden The author would like to thank the anonymous reviewers for their

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

At the Summer Academy 2014 in Olympia:

At the Summer Academy 2014 in Olympia: In an ever globalized world, mulple and complex necessies arise constantly. These concern not only the economic, but also the polical and cultural domains. Naons and cultures come, inevitably, into closer

More information

The Arc(c Council. Founda'on: 1996 O3awa Declara(on establishes the Arc(c Council as a high- level intergovernmental forum to:

The Arc(c Council. Founda'on: 1996 O3awa Declara(on establishes the Arc(c Council as a high- level intergovernmental forum to: The Arc(c Council Founda'on: 1996 O3awa Declara(on establishes the Arc(c Council as a high- level intergovernmental forum to: Promote coopera+on, coordina+on and interac+on among the Arc+c States, with

More information

Money versus networks. How upper middle class groups compete for access to the best middle schools in the Parisian periphery

Money versus networks. How upper middle class groups compete for access to the best middle schools in the Parisian periphery Money versus networks. How upper middle class groups compete for access to the best middle schools in the Parisian periphery Joint North Western Sciences Po Workshop Inequali9es, Neighborhoods, and Ins9tu9ons

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

Political Profiling using Feature Engineering and NLP

Political Profiling using Feature Engineering and NLP SMU Data Science Review Volume 1 Number 4 Article 10 2018 Political Profiling using Feature Engineering and NLP Chiranjeevi Mallavarapu Southern Methodist University, cmallavarapu@smu.edu Ramya Mandava

More information

Brian Fanzo Founder of isocialfanz.com. Keynote Speaker - Media Kit

Brian Fanzo Founder of isocialfanz.com. Keynote Speaker - Media Kit Brian Fanzo Founder of isocialfanz.com Keynote Speaker - Media Kit Biography: Brian Fanzo SPEAKER. STRATEGIST. FOUNDER Brian Fanzo talks fast and tweets faster. A proud pager wearing millennial, he is

More information

Best Prac*ces & Training Guide for Professional Development and Networking - June 2011-

Best Prac*ces & Training Guide for Professional Development and Networking - June 2011- Best Prac*ces & Training Guide for Professional Development and Networking - June 2011- Linked In is one tool that can be helpful for online professional networking purposes. As with any such tool, it

More information

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?

Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes? Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes? Benoît Dupont Structure of the presentation Conceptualizing cybercrime

More information

There s a Cloud in My Enterprise

There s a Cloud in My Enterprise Healthcare Simplified - Leveraging Technology to stay Connected and Improve Program Opera?ons: There s a Cloud in My Enterprise Dale Posont Sr. Principal August 23, 2012 Agenda Discussion Topics Ø Defining

More information

An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling

An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling Deqing Yang, Yanghua Xiao, Hanghang Tong, Junjun Zhang and Wei Wang School of Computer Science Shanghai Key Laboratory of Data Science

More information

How can new media strengthen. 16th Operation Lifesaver International Symposium Navigating Rail Safety

How can new media strengthen. 16th Operation Lifesaver International Symposium Navigating Rail Safety How can new media strengthen the message? 16th Operation Lifesaver International Symposium Navigating Rail Safety August 31, 2010 Overview AnnetteLapkowski Lapkowski, FloridaOL Bryan Glover, CSXT Katie

More information

uropeans participation in cultural activities

uropeans participation in cultural activities uropeans participation in cultural activities A EUROBAROMETER SURVEY CARRIED OUT AT THE REQUEST OF THE EUROPEAN COMMISSION, EUROSTAT EXECUTIVE SUMMARY 1. Radio and television in the European Union 1.1.

More information

1-1. Copyright 2015 Pearson Education, Inc.

1-1. Copyright 2015 Pearson Education, Inc. 1-1 Chapter 1: What Is Organiza3onal Behavior? 1-2 Learning Objectives A:er studying this chapter, you should be able to: Ø Demonstrate the importance of interpersonal skills in the workplace. Ø Describe

More information

THE NEW NEWS AUDIENCE 12 ways consumers have changed in the digital age

THE NEW NEWS AUDIENCE 12 ways consumers have changed in the digital age THE NEW NEWS AUDIENCE 12 ways consumers have changed in the digital age Lee Rainie Director Pew Research Center s Internet & American Life Project Knight Law and Media Program / Information Society Project

More information

Cover page design by Udara Jayawardhane. The cover image is for visual effect only and does not imply the expression of any opinion whatsoever on the

Cover page design by Udara Jayawardhane. The cover image is for visual effect only and does not imply the expression of any opinion whatsoever on the Cover page design by Udara Jayawardhane. The cover image is for visual effect only and does not imply the expression of any opinion whatsoever on the part of the author concerning the legal status of any

More information

US MOBILE NEWS SEEKING TRENDS. Based on October September 2015 data. Excerpted from a full findings report delivered November 2015.

US MOBILE NEWS SEEKING TRENDS. Based on October September 2015 data. Excerpted from a full findings report delivered November 2015. US MOBILE NEWS SEEKING TRENDS Based on October 2013- September 2015 data. Excerpted from a full findings report delivered November 2015. BACKGROUND Knight Foundation commissioned Nielsen to delve into

More information

Social Analysis of an Urban Community Regarding Security Satisfaction

Social Analysis of an Urban Community Regarding Security Satisfaction International Journal of Research in Humanities and Social Studies Volume 5, Issue 3, 2018, PP 31-36 ISSN 2394-6288 (Print) & ISSN 2394-6296 (Online) Social Analysis of an Urban Community Regarding Security

More information

Survey Report Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors

Survey Report Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors Introduction Survey Report 2009 Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors The Donald W. Reynolds Journalism Institute Center for Advanced Social

More information

Ethics in the age of Informatics, Big Data and AI

Ethics in the age of Informatics, Big Data and AI Ethics in the age of Informatics, Big Data and AI Professor dr. May Thorseth, Dept. of Philosophy and Religious Studies, NTNU Director of Programme for Applied Ethics, NTNU Email: may.thorseth@ntnu.no

More information

Transla'ng public health research for policymakers and advocates

Transla'ng public health research for policymakers and advocates Transla'ng public health research for policymakers and advocates Alexandra B. Morshed, MS, and Rachel G. Tabak, PhD, RD Preven;on Research Center in St. Louis, Brown School, Washington University in St.

More information

DHP P244: Terrorism & Counterterrorism. Dr. James JF Forest. Week 9: Counterterrorism Frameworks & Strategies

DHP P244: Terrorism & Counterterrorism. Dr. James JF Forest. Week 9: Counterterrorism Frameworks & Strategies DHP P244: Terrorism & Counterterrorism Dr. James JF Forest Week 9: Counterterrorism Frameworks & Strategies 4 Premises 1. Terrorism will be a part of the foreseeable future, and it is likely that terrorist

More information

Electronic Privacy Information Center September 24, 2001

Electronic Privacy Information Center September 24, 2001 Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to

More information

Section 9-1: Understanding the Constitution

Section 9-1: Understanding the Constitution Name: Date: Chapter 9 Study Guide Section 9-1: Understanding the Constitution Fill in the blanks: 1. The United States government may be described as a, or one in which people exercise political power

More information

The changing face of Britain

The changing face of Britain The changing face of Britain Multicultural Britain 2011 census 19.5% of the population of England and Wales now comes from a non-white British background White British (80.5%) Any Other White (5.4%) Irish

More information

Criminal Justice I Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes

Criminal Justice I Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes Criminal Justice I Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes Weeks 1-3 STANDARD 1,2,3 COMMUNICATION IN LAW ENFORCEMENT Define communication and explain the differences

More information

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175--

H.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175-- H.R.3162 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Enrolled Bill (Sent to President)) SEC. 817. EXPANSION

More information

Douwe Korff Professor of International Law London Metropolitan University, London (UK)

Douwe Korff Professor of International Law London Metropolitan University, London (UK) NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European

More information

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013

Cybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013 www.coe.int/tcy Strasbourg, 5 November 2013 T-CY (2013)30 Cybercrime Convention Committee (T-CY) Ad-hoc Subgroup on Transborder Access and Jurisdiction Report of the Transborder Group for 2013 Report prepared

More information

Freedom of Expression Quiz

Freedom of Expression Quiz FREEDOM Freedom of Expression Quiz This quiz is designed as educational material complementing the brochure First steps in understanding Freedom of Expression online and offline - based on current case

More information

Monitoring social and geopolitical events with Big Data

Monitoring social and geopolitical events with Big Data Monitoring social and geopolitical events with Big Data Boston University Alumni Club of Spain Tomasa Rodrigo April 2018 Monitoring economic, social and geopolitical events with Big Data Index 01 Opportunities

More information

A Large-Scale Study on Persian Weblogs

A Large-Scale Study on Persian Weblogs A Large-Scale Study on Persian Weblogs Vahed Qazvinian 1, Abtin Rassolian 1, Mohammad Shafiei 1, and Jafar Adibi 2 1 Computer Engineering Department, Sharif University of Technology, Tehran, Iran {qazvinian,

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT

More information

Ethics of Information Security

Ethics of Information Security Ethics of Information Security Sara Afshar Professional Ethics Course MRTC/Mälardalen University 10 May 2016 1 Ethics Ø Distinguishing right from wrong, and good from bad Ø It analyzes the morality of

More information

Election Simulation (for campaign roles)

Election Simulation (for campaign roles) Election Simulation (for campaign roles) We will run an election simulation with three candidates. Students will be divided into four groups. Three of the groups will be composed of a candidate running

More information

@all studying the #twitter phenomenon. December 2009

@all studying the #twitter phenomenon. December 2009 @all studying the #twitter phenomenon December 2009 This work is licensed by fabernovel and L Atelier under the Creative Commons to allow for further contributions by other specialists and web users in

More information

Response to invitation for submissions on issues relevant to the proportionality of bulk powers

Response to invitation for submissions on issues relevant to the proportionality of bulk powers Response to invitation for submissions on issues relevant to the proportionality of bulk powers Written submission by Dr. Daragh Murray, Prof. Pete Fussey and Prof. Maurice Sunkin QC (Hon), members of

More information

Need for a uniform European registra2on system for volunteer par2cipa2on? Annick Peremans Research Centre Aalst Belgium

Need for a uniform European registra2on system for volunteer par2cipa2on? Annick Peremans Research Centre Aalst Belgium Need for a uniform European registra2on system for volunteer par2cipa2on? Research Centre Aalst Belgium Conflict of interest No grants received form any company men2oned in this presenta2on Presenta2on

More information

From Brexit to Trump: Social Media s Role in Democracy

From Brexit to Trump: Social Media s Role in Democracy COVER FEATURE OUTLOOK From Brexit to Trump: Social Media s Role in Democracy Wendy Hall, Ramine Tinati, and Will Jennings, University of Southampton The ability to share, access, and connect facts and

More information

Chapter 8: Mass Media and Public Opinion Section 1 Objectives Key Terms public affairs: public opinion: mass media: peer group: opinion leader:

Chapter 8: Mass Media and Public Opinion Section 1 Objectives Key Terms public affairs: public opinion: mass media: peer group: opinion leader: Chapter 8: Mass Media and Public Opinion Section 1 Objectives Examine the term public opinion and understand why it is so difficult to define. Analyze how family and education help shape public opinion.

More information

POW/MIA Chair of Honor Donation Program PR Commitment Plan & Requirements

POW/MIA Chair of Honor Donation Program PR Commitment Plan & Requirements POW/MIA Chair of Honor Donation Program PR Commitment Plan & Requirements Greetings! Thank you for you interest in participating in s POW/MIA Chair of Honor Donation Program. The purpose of this program

More information

Chapter 8:3 The Media

Chapter 8:3 The Media Chapter 8:3 The Media Rev_13:11 And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon. Chapter 8:3 The Media o We will examine the role of the

More information

Mining Trending Topics:

Mining Trending Topics: Mining Trending Topics: How to Use Social Media to Tell Stories Your Audience Cares About January 27, 2016 Thank You Harnisch Foundation! For funding our Webinar equipment Knight Foundation! For its support

More information

Psychological Factors

Psychological Factors Psychological Factors Consumer Decision Making e.g., Impulsiveness, openness e.g., Buying choices Personalization 1. 2. 3. Increase click-through rate predictions Enhance recommendation quality Improve

More information

Working Group In- progress Report to APNIC Member Mee9ng (AMM)

Working Group In- progress Report to APNIC Member Mee9ng (AMM) Working Group In- progress Report to APNIC Member Mee9ng (AMM) Naveen Tandon Chair Shyam Nair Co- Chair Yi Lee Co- Chair APNIC 31, Hong Kong 25 th February 2011 Working Group - Facts - Formed at APNIC

More information

Users reading habits in online news portals

Users reading habits in online news portals Esiyok, C., Kille, B., Jain, B.-J., Hopfgartner, F., & Albayrak, S. Users reading habits in online news portals Conference paper Accepted manuscript (Postprint) This version is available at https://doi.org/10.14279/depositonce-7168

More information

The Greek crisis effects on the Albanian economy

The Greek crisis effects on the Albanian economy The Greek crisis effects on the Albanian economy MSc. Veronika Durmishi, (PhD Candidate) University Pavarësia Vlorë, Albania MSc. Valbona Gjini, (PhD Candidate) University Ismail Qemali Vlore, Albania

More information

THE DARK WEB VIRGINIA TECH EXECUTIVE BRIEFING CENTER MAY 18TH, N GLEBE RD ARLINGTON, VA, 22203

THE DARK WEB VIRGINIA TECH EXECUTIVE BRIEFING CENTER MAY 18TH, N GLEBE RD ARLINGTON, VA, 22203 UNDERSTANDING THE DARK WEB AND ITS IMPLICATIONS FOR POLICY VIRGINIA TECH EXECUTIVE BRIEFING CENTER MAY 18TH, 2018 900 N GLEBE RD ARLINGTON, VA, 22203 AGENDA 8:30 am 9:00 am Registration 9:00 am - 9:15

More information

Q. What do the Law Commission and the Ministry of Justice recommend?

Q. What do the Law Commission and the Ministry of Justice recommend? Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government

More information

Analysis of Social Voting Patterns on Digg

Analysis of Social Voting Patterns on Digg Analysis of Social Voting Patterns on Digg Kristina Lerman and Aram Galstyan University of Southern California Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 9292 {lerman,galstyan}@isi.edu

More information

arxiv: v1 [cs.cy] 11 Jun 2008

arxiv: v1 [cs.cy] 11 Jun 2008 Analysis of Social Voting Patterns on Digg Kristina Lerman and Aram Galstyan University of Southern California Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 9292, USA {lerman,galstyan}@isi.edu

More information

MAVA 102 Introduc0on to Media & Communica0ons. Week 2 - Media, Communica0on & Culture

MAVA 102 Introduc0on to Media & Communica0ons. Week 2 - Media, Communica0on & Culture MAVA 102 Introduc0on to Media & Communica0ons Week 2 - Media, Communica0on & Culture 1 Media Ubiquity Last week we started by discussing how much of our 6me we may spend using media. The average person

More information

LEVEL OF ANALYSIS - STATE AND NEW ACTORS

LEVEL OF ANALYSIS - STATE AND NEW ACTORS INTERNATIONAL POLITICS INRL 204 LEVEL OF ANALYSIS - STATE AND NEW ACTORS Assist. Prof. Dr. Gökay ÖZERİM Department of International Relations gokay.ozerim@yasar.edu.tr gozerim.yasar.edu.tr STATE (i) a

More information

CHICAGO NEWS LANDSCAPE

CHICAGO NEWS LANDSCAPE CHICAGO NEWS LANDSCAPE Emily Van Duyn, Jay Jennings, & Natalie Jomini Stroud January 18, 2018 SUMMARY The city of is demographically diverse. This diversity is particularly notable across three regions:

More information

Privacy versus government surveillance where network effects meet public choice. Ross Anderson Cambridge

Privacy versus government surveillance where network effects meet public choice. Ross Anderson Cambridge Privacy versus government surveillance where network effects meet public choice Ross Anderson Cambridge Two views of money and power The Bay Area view: money and power are all about network effects, which

More information

Capturing the Modern News Consumer

Capturing the Modern News Consumer Capturing the Modern News Consumer Capturing the Modern News Consumer 1. Who Do We Need to Reach? This is the most educated, informed generation that has ever lived. To think that young people have no

More information

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute

Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory

More information

ANNUAL SURVEY REPORT: GEORGIA

ANNUAL SURVEY REPORT: GEORGIA ANNUAL SURVEY REPORT: GEORGIA 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 TABLE OF CONTENTS

More information

WORLD LIBRARY AND INFORMATION CONGRESS: 73RD IFLA GENERAL CONFERENCE AND COUNCIL

WORLD LIBRARY AND INFORMATION CONGRESS: 73RD IFLA GENERAL CONFERENCE AND COUNCIL Date : 08/06/2007 Access to information as a driver towards closing of the gender equality gap: the emerging scene in Kenya Wambui Wagacha Head of Library and Documentation Kenya Institute for Public Policy

More information