Exploiting the dark triad for national defense capabilities. Dimitris Gritzalis
|
|
- Kerry Thornton
- 5 years ago
- Views:
Transcription
1 Exploiting the dark triad for national defense capabilities Dimitris Gritzalis May 2015
2 Exploiting the dark triad for national defense capabilities Professor Dimitris A. Gritzalis Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Dept. of Informatics, Athens University of Economics & Business
3 What is all about? The problem: An insider as a severe threat to na.onal defense The theory: Narcissists tend to turn insiders The defense: Reveal narcissists The data source: Online Social Networks and the Web 2.0 The tool: NEREUS Framework
4 The problem: The Insider threat Insider threat was the top priority to protect for 2014 Insiders are persons who: - are legi.mately given access rights to a Cri.cal Infrastructure - misuse their privileges and violate security policy Insiders consist the top source of data breaches Source: CERT, Cyber Security Watch Survey: How Bad Is the Threat?, Carnegie Mellon University, USA, 2014.
5 The theory: The Dark Triad Dark Triad personality traits Ø Narcissism: Inflated self- view and focus on themselves Ø Machiavellianism: Manipula.ve personality Ø Psychopathy: High impulsivity and thrill- seeking, along with low empathy and low anxiety Dark Triad traits are used to extend Five Factor Model (FFM) to represent socially malevolent behavior The wealth of data provided by OSN users has opened the door to a new way of analyzing personality Ability to exploit narcissism personality trait Ø Narcissism trait is also examined by Shaw and the FBI Sources: M. Maasberg, J. Warren, N. Beebe, The Dark Side of the Insider: Detec.ng the Insider Threat through examina.on of Dark Triad personality traits. Federal Bureau of Inves.ga.on, The insider threat: An introduc=on to detec=ng and deterring an insider spy, USA, E. Shaw, K. Ruby, J. Post, The insider threat to informa.on systems: The psychology of the dangerous insider, Security Awareness Bulle=n, vol. 2, no. 98, pp
6 The defense: Open Source Intelligence Open Source Intelligence (OSINT) is produced from publicly available informa.on, which is: Ø Collected, exploited and disseminated in a Amely manner Ø Offered to an appropriate audience Ø Used for the purpose of addressing a specific intelligence requirement Publicly available informa.on refers to (not only): Ø Tradi.onal media (e.g. television, newspapers, radio, magazines, etc.) Ø Web- based communi.es (e.g. social networking sites, blogs, etc.) Ø Public data (e.g. government reports, official data, public hearings, etc.) Ø Amateur observa.on/repor.ng (e.g. amateur spoaers, radio monitors, etc.) OSINT defined by US Dept. of Defense (Public Law , Sec. 931,Na.onal Defense Authoriza.on Act for Fiscal Year 2006). SOCMINT is produced from Online Social Networks & the Web 2.0
7 The data source: Web 2.0 & Online Social Networks Source: hap://socialmediatoday.com/
8 The tool: The NEREUS Framework NEREUS Framework OSN: TwiPer Tools used for the open data analysis Science Informa.cs Sociology Psychology Theory Graph Theory Content Analysis Theory of Planned Behavior Social Learning Theory ApplicaAon: Insider threat detec.on/predic.on, influen.al users detec.on, means of communica.on evalua.on, etc.
9 The NEREUS Framework in a nutshell
10 The dataset ualized Focus on a Greek TwiPer community: Ø Context sensi.ve research Ø U.lize ethnological features rooted in locality Ø Extract and analyze results Analysis of content and measures of user influence and usage intensity User Categories: Follower, Following, Retweeter Graph: Ø Each user is a node Ø Every interac.on is a directed edge fully crawled users (personal & sta.s.cal data) Ø Name, ID, personal descrip.on, URL, language, geoloca.on, profile state, lists, # of following/followers, tweets, # of favorites, # of men.ons, # of retweets TwiPer (Greece, ) connec.ons among them
11 Graph theoreacal and content analysis Strongly connected components: Ø There exists 1 large component ( nodes connected to each other) and several smaller ones Node Loneliness: Ø 99% of users connected to someone Small World phenomenon: Ø Every user lies <6 hops away from anyone else Indegree DistribuAon: Ø # of users following each user Ø Average 13.2 followers/user Outdegree DistribuAon: Ø # of users each user follows Ø Average 11 followers/user Usage Intensity DistribuAon: Weighted aggrega.on of: {# of followers, # of followings, tweets, retweets, men.ons, favorites, lists} Important cluster of users
12 Conclusions ü Web 2.0 produces vast amounts of crawlable informa.on and OSINT can transform it into intelligence. ü OSINT can assist in detec.ng the Dark Triad traits (narcissis.c behavior, etc.). ü OSINT can help in predic.ng insiders, in predic.ng delinquent behavior, and in enhancing na.onal defense. ü OSINT intrusive nature dictates use for specific purposes, according to law.
13 References 1. Gritzalis D., Stavrou V., Kandias M., Stergiopoulos G., Insider Threat: Enhancing BPM through Social Media, in Proc. of the 6 th IFIP Interna=onal Conference on New Technologies, Mobility and Security, IEEE Press, Gritzalis D., Kandias M., Stavrou V., Mitrou L., "History of Informa.on: The case of Privacy and Security in Social Media", in Proc. of the History of Informa=on Conference, Law Library Publica.ons, Gritzalis D., Insider threat preven.on through Open Source Intelligence based on Online Social Networks, Keynote address, 13 th European Conference on Cyber Warfare and Security (ECCWS- 2014), Greece, Kandias M., Mylonas A., Virvilis N., Theoharidou M., Gritzalis D., An Insider Threat Predic.on Model, in Proc. of the 7 th Interna=onal Conference on Trust, Privacy and Security in Digital Business, pp , Springer (LNCS 6264), Spain, Kandias M., Galbogini K., Mitrou L., Gritzalis D., "Insiders trapped in the mirror reveal themselves in social media", in Proc. of the 7 th Interna=onal Conference on Network and System Security, pp , Springer, Kandias M., Mitrou L., Stavrou V., Gritzalis D., Which side are you on? A new Panop.con vs. privacy, in Proc. of the 10 th Interna=onal Conference on Security and Cryptography, pp , ScitecPress, Kandias M., Stavrou V., Bozovic N., Mitrou L., Gritzalis D., "Can we trust this user? Predic.ng insider s attude via YouTube usage profiling", in Proc. of 10 th IEEE Interna=onal Conference on Autonomic and Trusted Compu=ng, pp , IEEE Press, Kandias M., Virvilis N., Gritzalis D., "The Insider threat in Cloud Compu.ng", in Proc. of the 6 th Interna=onal Conference on Cri=cal Infrastructure Security, pp , Springer, Kandias M., Stavrou V., Bosovic N., Gritzalis D., Proac.ve insider threat detec.on through social media: The YouTube case, in Proc. of the 12 th Workshop on Privacy in the Electronic Society, pp , ACM, Germany, Kandias M., Mitrou L., Stavrou V., Gritzalis D., "YouTube user and usage profiling: Stories of poli.cal horror and security success", in e- Business and Telecommunica=ons, Springer, Kotzanikolaou P., Theoharidou M., Gritzalis D., Cascading effects of common- cause failures on Cri.cal Infrastructures, in Proc. of the 7 th IFIP Interna=onal Conference on Cri=cal Infrastructure Protec=on, pp , Springer, USA, Mitrou L., Kandias M., Stavrou V., Gritzalis D., "Social media profiling: A Panop.con or Omniop.con tool?", in Proc. of the 6 th Conference of the Surveillance Studies Network, Spain, Pipyros K., Mitrou L., Gritzalis D., Apostolopoulos T., "A cyber aaack evalua.on methodology", in Proc. of the 13 th European Conference on Cyber Warfare and Security, Athens, Theoharidou M., Kotzanikolaou P., Gritzalis D., Risk- based cri.cality analysis", in Proc. of the 3 rd IFIP Interna=onal Conference on Cri=cal Infrastruc- ture Protec=on, Springer, USA, 2009.
Events and Memes in Media- rich Social Informa7on Networks
Events and Memes in Media- rich Social Informa7on Networks Lexing Xie Computer Science Australian Na7onal University EBMIP Workshop, Oct 2013 2 Internet Memes Quotes Tags Links #occupy hqp://y2u.be/_oblgsz8ssm
More informationIntroduc)on to Nexalogy Wikileaks and Extremism case studies
Introduc)on to Nexalogy Wikileaks and Extremism case studies The New Facts of Life 3.5+ billion Pieces of content (links, news stories, blog posts) posted to facebook weekly 1.14 million Average tweets
More informationPredicting Information Diffusion Initiated from Multiple Sources in Online Social Networks
Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang
More informationGlobal Ci)zens and the U.S. Security Surveillance Dragnet. Center for Democracy & Technology Webinar 18 July 2013
Global Ci)zens and the U.S. Security Surveillance Dragnet Center for Democracy & Technology Webinar 18 July 2013 Purpose of Webinar Explain laws under which the U.S. Na)onal Security Agency conducts surveillance
More informationSecure Electronic Voting: New trends, new threats, new options. Dimitris Gritzalis
Secure Electronic Voting: New trends, new threats, new options Dimitris Gritzalis 7 th Computer Security Incidents Response Teams Workshop Syros, Greece, September 2003 Secure Electronic Voting: New trends,
More informationSecure and Reliable Electronic Voting. Dimitris Gritzalis
Secure and Reliable Electronic Voting Dimitris Gritzalis Secure and Reliable Electronic Voting Associate Professor Dimitris Gritzalis Dept. of Informatics Athens University of Economics & Business & e-vote
More informationSecure Electronic Voting: Capabilities and Limitations. Dimitris Gritzalis
Secure Electronic Voting: Capabilities and Limitations Dimitris Gritzalis Secure Electronic Voting: Capabilities and Limitations 14 th European Forum on IT Security Paris, France, 2003 Prof. Dr. Dimitris
More informationSafer internet evening. 11 February 2014
Safer internet evening 11 February 2014 Mr Martin and Mrs Ramsay Awareness raising session for Parents and Carers Why are we here? Social Media 2011 Money management Communica>on skills Confidence Learning
More informationProfessional Issues. Data Protec1on (Bo4, Ch 13)
Professional Issues Data Protec1on (Bo4, Ch 13) Overview Overview of the 1998 Data Protec1on Act (DPA) Defini1ons Changes since 1984 Act Sensi1ve Personal Data & Consent The eight principles Freedom of
More informationEUROPEAN YOUTH Report
EUROPEAN YOUTH - 1 - Report Contents 1. Study Design (p. 3-4) 2. Perception Of The European Union (p. 5-) 3. Political attitudes (p. 21-45) 4. Media Usage (p. 4-54) 5. Outlook Into The Future (p. 55-).
More informationIEEE ComSoc Quantum Communica/ons and Informa/on Technology - ETC (QCIT-ETC)
IEEE ComSoc Quantum Communica/ons and Informa/on Technology - ETC (QCIT-ETC) Mee/ng at Globecom 2016 Place/Floor/Room: Washington Hilton/Terrace/Fairchild East Date/Time: Wednesday Dec. 7, 2016, 2:00pm
More informationFunctional Requirements for a Secure Electronic Voting System
Functional Requirements for a Secure Electronic Voting System Spyros IKONOMOPOULOS 1, Costas LAMBRINOUDAKIS 1, Dimitris GRITZALIS 2, Spyros KOKOLAKIS 1, Kostas VASSILIOU 1 1 Dept. of Information and Communication
More informationSocial Networking in Many Forms
for Independent School Admissions Emily H.L. Surovick Director of Lower School Admission, Chestnut Hill Academy Vincent H. Valenzuela Director of Admission, Chestnut Hill Academy in Many Forms Blogging
More informationEnhancing efficiency in remittance markets in Latin America and the Caribbean
Enhancing efficiency in remittance markets in Latin America and the Caribbean Updates on the CEMLA-IDB-WB Remittances program Global Payments Week 2010 Amsterdam, October 22, 2010 Outline Importance of
More informationCanadian Museums Associa.on EDUCATIONAL SESSIONS. The Global Role of Museums in the Development of Civil Society
Mar.n Segger Canadian Museums Associa.on EDUCATIONAL SESSIONS The Global Role of Museums in the Development of Civil Society Moderator: Mar.n Segger, President, Commonwealth Associa6on of Museums (CAM),
More informationMonday, March 4, 13 1
1 2 Using Social Media to Achieve Goals Networking Your Way to Employment Friday, November 18, 2011 3 LinkedIn Establish your profile, resume, & professional picture Incorporate all keywords a recruiter
More informationHANDS ACROSS BORDERS. An International Workshop on. Alterna(ve Mechanisms to Establish and Govern Transboundary Conserva(on Ini(a(ves
HANDS ACROSS BORDERS An International Workshop on Transboundary Conservation Alterna(ve Mechanisms to Establish and Govern Transboundary Conserva(on Ini(a(ves Michael Schoon School of Sustainability Arizona
More informationComputational challenges in analyzing and moderating online social discussions
Computational challenges in analyzing and moderating online social discussions Aristides Gionis Department of Computer Science Aalto University Machine learning coffee seminar Oct 23, 2017 social media
More informationSocial. Media. in prevention efforts. Lyndsey Hawkins. Bradley University
Social in prevention efforts Media Lyndsey Hawkins Bradley University why me? BA in Communications PR MA in Human Service Admin. CADP I AM NOT AN EXPERT! why we are here today: Define social media and
More informationLOCAL MEDIA APP TRENDS
LOCAL MEDIA APP TRENDS SUMMER 2013 Survey of Local Media App Users ABOUT THIS PROJECT EXECUTIVE SUMMARY Mobile moves incredibly fast. Keeping pace with both the technology and consumer expectations presents
More informationOUR PANELISTS. Linda Morrison L&D Academy Administrator Travelex. Be+y Mills L&D Manager Centra Health. Ma+ Hart L&OD Resource Officer Metropolitan
REMINDERS Please post your ques5ons in the Ques5ons Box of the GoToWebinar Control Panel Audience polls will be conducted during this webinar A recording of this webinar will be made available a few days
More informationWomen Without Borders: Gender and Informal Cross- Border Trade
Women Without Borders: Gender and Informal Cross- Border Trade Speakers: Lisabeth Meyers, Banyan Global Moderator: Sait Mboob, USAID Facilitator: Julie MacCartee, USAID Date: March 8, 2017 Sait Mboob,
More informationCSCI 325: Distributed Systems. Objec?ves. Professor Sprenkle. Course overview Overview of distributed systems Introduc?on to reading research papers
CSCI 325: Distributed Systems Professor Sprenkle Objec?ves Course overview Overview of distributed systems Introduc?on to reading research papers Sept 8, 2017 Sprenkle - CSCI 325 2 1 Distributed Systems?
More informationANNUAL SURVEY REPORT: ARMENIA
ANNUAL SURVEY REPORT: ARMENIA 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 ANNUAL SURVEY REPORT,
More informationDecentralised solutions for renewable energies and water in developing countries
Decentralised solutions for renewable energies and water in developing countries Energy and Water Solu0ons in sub- Saharan Africa 16. - 17. October 2014 Radolfzell at Lake Constance, Germany Dr. Julia
More informationStacy L. Schaffer Founder, 31:8 Project
Stacy L. Schaffer Founder, 31:8 Project Be the Voice: How healthcare providers can make a difference in the fight against human trafficking. Objec;ves Define human trafficking and the different categories
More informationFundamentals of National Migration Governance:
Fundamentals of National Migration Governance: IOM s approach, programs and tools Md. Shahidul Haque Director, Interna6onal Coopera6on and Partnerships, IOM Conference on Mainstreaming Migra0on into Development
More informationAre Friends Overrated? A Study for the Social News Aggregator Digg.com
Are Friends Overrated? A Study for the Social News Aggregator Digg.com Chris>an Doerr, Norbert Blenn, Siyu Tang, Piet Van Mieghem TU DelG, Mekelweg 4, 2628CD DelG, The Netherlands {C.Doerr, N.Blenn, S.Tang,
More informationThe language for most tablet questions was customized based on whether the respondent said they had an ipad or another type of tablet computer.
PEW RESEARCH CENTER S PROJECT FOR EXCELLENCE IN JOURNALISM IN COLLABORATION WITH THE ECONOMIST GROUP Tablet News Web Survey September 6-19, N=300 tablet news users The language for most tablet questions
More informationTackling Police Corrup1on in South Africa. 21 November 2013 Gareth Newham Ins1tute for Security Studies
Tackling Police Corrup1on in South Africa 21 November 2013 Gareth Newham Ins1tute for Security Studies Overview Corrup'on in SA Police Corrup'on as an occupa'onal hazard Recommenda'ons SA An1- Corrup1on
More informationReputation-Based Trust Management (extended abstract)
Reputation-Based Trust Management (extended abstract) Vitaly Shmatikov and Carolyn Talcott Computer Science Laboratory, SRI International, Menlo Park, CA 94025 USA shmat,clt @csl.sri.com Abstract. We propose
More informationThe Buddy System. A Distributed Reputation System Based On Social Structure 1
The Buddy System A Distributed Reputation System Based On Social Structure 1 Stefan Fähnrich, Philipp Obreiter, Birgitta König-Ries Institute for Program Structures and Data Organization Universität Karlsruhe
More informationExperiments on Data Preprocessing of Persian Blog Networks
Experiments on Data Preprocessing of Persian Blog Networks Zeinab Borhani-Fard School of Computer Engineering University of Qom Qom, Iran Behrouz Minaie-Bidgoli School of Computer Engineering Iran University
More informationANNUAL SECURITY & FIRE SAFETY REPORT
October 1, 215 ANNUAL SECURITY & FIRE SAFETY Introduction to the Report We urge members of the University community to use this report as a guide for safe prac7ces on and off- campus. The Department of
More informationThe Pupitre System: A desk news system for the Parliamentary Meeting rooms
The Pupitre System: A desk news system for the Parliamentary Meeting rooms By Teddy Alfaro and Luis Armando González talfaro@bcn.cl lgonzalez@bcn.cl Library of Congress, Chile Abstract The Pupitre System
More informationSocial Media based Analysis of Refugees in Turkey
Social Media based Analysis of Refugees in Turkey Abdullah Bulbul, Cagri Kaplan, and Salah Haj Ismail Ankara Yildirim Beyazit University, Türkiye, abulbul@ybu.edu.tr http://ybu.edu.tr/abulbul Abstract.
More informationHDSE Summit #9. Keith G. Logan, Kutztown Univ. of PA
HDSE Summit #9 Keith G. Logan, Kutztown Univ. of PA Homeland security is not just about terrorism and counterterrorism. It is an amalgam of several distinct yet interrelated areas that include the gathering
More informationPrivate Sponsorship in Refugee Resettlement. February 2017
Private Sponsorship in Refugee Resettlement February 2017 Canada s Refugee Programs Canada accepts Conven8on refugees and those in refugee-like situa8ons for humanitarian reasons, according to the following
More informationImmigra6on Basics. Stephanie Paver, Senior A)orney. 1. Department of Homeland Security (DHS)
Immigra6on Basics Stephanie Paver, Senior A)orney U.S. Immigra6on Agencies 1. Department of Homeland Security (DHS) U.S. Ci'zenship & Immigra'on Services (USCIS)- former INS Customs & Border Protec'on
More informationTREND MONITOR. Scenario analysis and trend monitoring.
TREND MONITOR Scenario analysis and trend monitoring www.babaconsulting.com babatrendmonitor.com 2 TRENDSPOTTING Ø Trends are the differential elements that allow to attribute an added value to market
More informationPolarisation in Political Twitter Conversations
Polarisation in Political Twitter Conversations David Gunnarsson Lorentzen, Swedish School of Library and Information Science, Borås, Sweden The author would like to thank the anonymous reviewers for their
More informationDebating privacy and ICT
Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal
More informationAt the Summer Academy 2014 in Olympia:
In an ever globalized world, mulple and complex necessies arise constantly. These concern not only the economic, but also the polical and cultural domains. Naons and cultures come, inevitably, into closer
More informationThe Arc(c Council. Founda'on: 1996 O3awa Declara(on establishes the Arc(c Council as a high- level intergovernmental forum to:
The Arc(c Council Founda'on: 1996 O3awa Declara(on establishes the Arc(c Council as a high- level intergovernmental forum to: Promote coopera+on, coordina+on and interac+on among the Arc+c States, with
More informationMoney versus networks. How upper middle class groups compete for access to the best middle schools in the Parisian periphery
Money versus networks. How upper middle class groups compete for access to the best middle schools in the Parisian periphery Joint North Western Sciences Po Workshop Inequali9es, Neighborhoods, and Ins9tu9ons
More informationThe administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.
Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions
More informationPolitical Profiling using Feature Engineering and NLP
SMU Data Science Review Volume 1 Number 4 Article 10 2018 Political Profiling using Feature Engineering and NLP Chiranjeevi Mallavarapu Southern Methodist University, cmallavarapu@smu.edu Ramya Mandava
More informationBrian Fanzo Founder of isocialfanz.com. Keynote Speaker - Media Kit
Brian Fanzo Founder of isocialfanz.com Keynote Speaker - Media Kit Biography: Brian Fanzo SPEAKER. STRATEGIST. FOUNDER Brian Fanzo talks fast and tweets faster. A proud pager wearing millennial, he is
More informationBest Prac*ces & Training Guide for Professional Development and Networking - June 2011-
Best Prac*ces & Training Guide for Professional Development and Networking - June 2011- Linked In is one tool that can be helpful for online professional networking purposes. As with any such tool, it
More informationIdentity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes?
Identity Theft: Why It Is Not Going Away, How Come Law Enforcement Is Not Working, and Could Regulation Provide Better Outcomes? Benoît Dupont Structure of the presentation Conceptualizing cybercrime
More informationThere s a Cloud in My Enterprise
Healthcare Simplified - Leveraging Technology to stay Connected and Improve Program Opera?ons: There s a Cloud in My Enterprise Dale Posont Sr. Principal August 23, 2012 Agenda Discussion Topics Ø Defining
More informationAn Integrated Tag Recommendation Algorithm Towards Weibo User Profiling
An Integrated Tag Recommendation Algorithm Towards Weibo User Profiling Deqing Yang, Yanghua Xiao, Hanghang Tong, Junjun Zhang and Wei Wang School of Computer Science Shanghai Key Laboratory of Data Science
More informationHow can new media strengthen. 16th Operation Lifesaver International Symposium Navigating Rail Safety
How can new media strengthen the message? 16th Operation Lifesaver International Symposium Navigating Rail Safety August 31, 2010 Overview AnnetteLapkowski Lapkowski, FloridaOL Bryan Glover, CSXT Katie
More informationuropeans participation in cultural activities
uropeans participation in cultural activities A EUROBAROMETER SURVEY CARRIED OUT AT THE REQUEST OF THE EUROPEAN COMMISSION, EUROSTAT EXECUTIVE SUMMARY 1. Radio and television in the European Union 1.1.
More information1-1. Copyright 2015 Pearson Education, Inc.
1-1 Chapter 1: What Is Organiza3onal Behavior? 1-2 Learning Objectives A:er studying this chapter, you should be able to: Ø Demonstrate the importance of interpersonal skills in the workplace. Ø Describe
More informationTHE NEW NEWS AUDIENCE 12 ways consumers have changed in the digital age
THE NEW NEWS AUDIENCE 12 ways consumers have changed in the digital age Lee Rainie Director Pew Research Center s Internet & American Life Project Knight Law and Media Program / Information Society Project
More informationCover page design by Udara Jayawardhane. The cover image is for visual effect only and does not imply the expression of any opinion whatsoever on the
Cover page design by Udara Jayawardhane. The cover image is for visual effect only and does not imply the expression of any opinion whatsoever on the part of the author concerning the legal status of any
More informationUS MOBILE NEWS SEEKING TRENDS. Based on October September 2015 data. Excerpted from a full findings report delivered November 2015.
US MOBILE NEWS SEEKING TRENDS Based on October 2013- September 2015 data. Excerpted from a full findings report delivered November 2015. BACKGROUND Knight Foundation commissioned Nielsen to delve into
More informationSocial Analysis of an Urban Community Regarding Security Satisfaction
International Journal of Research in Humanities and Social Studies Volume 5, Issue 3, 2018, PP 31-36 ISSN 2394-6288 (Print) & ISSN 2394-6296 (Online) Social Analysis of an Urban Community Regarding Security
More informationSurvey Report Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors
Introduction Survey Report 2009 Victoria Advocate Journalism Credibility Survey The Victoria Advocate Associated Press Managing Editors The Donald W. Reynolds Journalism Institute Center for Advanced Social
More informationEthics in the age of Informatics, Big Data and AI
Ethics in the age of Informatics, Big Data and AI Professor dr. May Thorseth, Dept. of Philosophy and Religious Studies, NTNU Director of Programme for Applied Ethics, NTNU Email: may.thorseth@ntnu.no
More informationTransla'ng public health research for policymakers and advocates
Transla'ng public health research for policymakers and advocates Alexandra B. Morshed, MS, and Rachel G. Tabak, PhD, RD Preven;on Research Center in St. Louis, Brown School, Washington University in St.
More informationDHP P244: Terrorism & Counterterrorism. Dr. James JF Forest. Week 9: Counterterrorism Frameworks & Strategies
DHP P244: Terrorism & Counterterrorism Dr. James JF Forest Week 9: Counterterrorism Frameworks & Strategies 4 Premises 1. Terrorism will be a part of the foreseeable future, and it is likely that terrorist
More informationElectronic Privacy Information Center September 24, 2001
Electronic Privacy Information Center September 24, 2001 Analysis of Provisions of the Proposed Anti-Terrorism Act of 2001 Affecting the Privacy of Communications and Personal Information In response to
More informationSection 9-1: Understanding the Constitution
Name: Date: Chapter 9 Study Guide Section 9-1: Understanding the Constitution Fill in the blanks: 1. The United States government may be described as a, or one in which people exercise political power
More informationThe changing face of Britain
The changing face of Britain Multicultural Britain 2011 census 19.5% of the population of England and Wales now comes from a non-white British background White British (80.5%) Any Other White (5.4%) Irish
More informationCriminal Justice I Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes
Criminal Justice I Pacing Guide First Semester 1 st Quarter TN Standards Lesson Focus Additional Notes Weeks 1-3 STANDARD 1,2,3 COMMUNICATION IN LAW ENFORCEMENT Define communication and explain the differences
More informationH.R.3162 SEC EXPANSION OF THE BIOLOGICAL WEAPONS STATUTE. Chapter 10 of title 18, United States Code, is amended-- (1) in section 175--
H.R.3162 Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT ACT) Act of 2001 (Enrolled Bill (Sent to President)) SEC. 817. EXPANSION
More informationDouwe Korff Professor of International Law London Metropolitan University, London (UK)
NOTE on EUROPEAN & INTERNATIONAL LAW ON TRANS-NATIONAL SURVEILLANCE PREPARED FOR THE CIVIL LIBERTIES COMMITTEE OF THE EUROPEAN PARLIAMENT to assist the Committee in its enquiries into USA and European
More informationCybercrime Convention Committee (T-CY) Report of the Transborder Group for 2013
www.coe.int/tcy Strasbourg, 5 November 2013 T-CY (2013)30 Cybercrime Convention Committee (T-CY) Ad-hoc Subgroup on Transborder Access and Jurisdiction Report of the Transborder Group for 2013 Report prepared
More informationFreedom of Expression Quiz
FREEDOM Freedom of Expression Quiz This quiz is designed as educational material complementing the brochure First steps in understanding Freedom of Expression online and offline - based on current case
More informationMonitoring social and geopolitical events with Big Data
Monitoring social and geopolitical events with Big Data Boston University Alumni Club of Spain Tomasa Rodrigo April 2018 Monitoring economic, social and geopolitical events with Big Data Index 01 Opportunities
More informationA Large-Scale Study on Persian Weblogs
A Large-Scale Study on Persian Weblogs Vahed Qazvinian 1, Abtin Rassolian 1, Mohammad Shafiei 1, and Jafar Adibi 2 1 Computer Engineering Department, Sharif University of Technology, Tehran, Iran {qazvinian,
More informationCRS Report for Congress
Order Code RS21441 Updated July 6, 2005 CRS Report for Congress Received through the CRS Web Summary Libraries and the USA PATRIOT Act Charles Doyle Senior Specialist American Law Division The USA PATRIOT
More informationEthics of Information Security
Ethics of Information Security Sara Afshar Professional Ethics Course MRTC/Mälardalen University 10 May 2016 1 Ethics Ø Distinguishing right from wrong, and good from bad Ø It analyzes the morality of
More informationElection Simulation (for campaign roles)
Election Simulation (for campaign roles) We will run an election simulation with three candidates. Students will be divided into four groups. Three of the groups will be composed of a candidate running
More information@all studying the #twitter phenomenon. December 2009
@all studying the #twitter phenomenon December 2009 This work is licensed by fabernovel and L Atelier under the Creative Commons to allow for further contributions by other specialists and web users in
More informationResponse to invitation for submissions on issues relevant to the proportionality of bulk powers
Response to invitation for submissions on issues relevant to the proportionality of bulk powers Written submission by Dr. Daragh Murray, Prof. Pete Fussey and Prof. Maurice Sunkin QC (Hon), members of
More informationNeed for a uniform European registra2on system for volunteer par2cipa2on? Annick Peremans Research Centre Aalst Belgium
Need for a uniform European registra2on system for volunteer par2cipa2on? Research Centre Aalst Belgium Conflict of interest No grants received form any company men2oned in this presenta2on Presenta2on
More informationFrom Brexit to Trump: Social Media s Role in Democracy
COVER FEATURE OUTLOOK From Brexit to Trump: Social Media s Role in Democracy Wendy Hall, Ramine Tinati, and Will Jennings, University of Southampton The ability to share, access, and connect facts and
More informationChapter 8: Mass Media and Public Opinion Section 1 Objectives Key Terms public affairs: public opinion: mass media: peer group: opinion leader:
Chapter 8: Mass Media and Public Opinion Section 1 Objectives Examine the term public opinion and understand why it is so difficult to define. Analyze how family and education help shape public opinion.
More informationPOW/MIA Chair of Honor Donation Program PR Commitment Plan & Requirements
POW/MIA Chair of Honor Donation Program PR Commitment Plan & Requirements Greetings! Thank you for you interest in participating in s POW/MIA Chair of Honor Donation Program. The purpose of this program
More informationChapter 8:3 The Media
Chapter 8:3 The Media Rev_13:11 And I beheld another beast coming up out of the earth; and he had two horns like a lamb, and he spake as a dragon. Chapter 8:3 The Media o We will examine the role of the
More informationMining Trending Topics:
Mining Trending Topics: How to Use Social Media to Tell Stories Your Audience Cares About January 27, 2016 Thank You Harnisch Foundation! For funding our Webinar equipment Knight Foundation! For its support
More informationPsychological Factors
Psychological Factors Consumer Decision Making e.g., Impulsiveness, openness e.g., Buying choices Personalization 1. 2. 3. Increase click-through rate predictions Enhance recommendation quality Improve
More informationWorking Group In- progress Report to APNIC Member Mee9ng (AMM)
Working Group In- progress Report to APNIC Member Mee9ng (AMM) Naveen Tandon Chair Shyam Nair Co- Chair Yi Lee Co- Chair APNIC 31, Hong Kong 25 th February 2011 Working Group - Facts - Formed at APNIC
More informationUsers reading habits in online news portals
Esiyok, C., Kille, B., Jain, B.-J., Hopfgartner, F., & Albayrak, S. Users reading habits in online news portals Conference paper Accepted manuscript (Postprint) This version is available at https://doi.org/10.14279/depositonce-7168
More informationThe Greek crisis effects on the Albanian economy
The Greek crisis effects on the Albanian economy MSc. Veronika Durmishi, (PhD Candidate) University Pavarësia Vlorë, Albania MSc. Valbona Gjini, (PhD Candidate) University Ismail Qemali Vlore, Albania
More informationTHE DARK WEB VIRGINIA TECH EXECUTIVE BRIEFING CENTER MAY 18TH, N GLEBE RD ARLINGTON, VA, 22203
UNDERSTANDING THE DARK WEB AND ITS IMPLICATIONS FOR POLICY VIRGINIA TECH EXECUTIVE BRIEFING CENTER MAY 18TH, 2018 900 N GLEBE RD ARLINGTON, VA, 22203 AGENDA 8:30 am 9:00 am Registration 9:00 am - 9:15
More informationQ. What do the Law Commission and the Ministry of Justice recommend?
Review of the Search and Surveillance Act 2012 Questions and Answers The Act Q. What does the Search and Surveillance Act do? A. The Act outlines rules for how New Zealand Police and some other government
More informationAnalysis of Social Voting Patterns on Digg
Analysis of Social Voting Patterns on Digg Kristina Lerman and Aram Galstyan University of Southern California Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 9292 {lerman,galstyan}@isi.edu
More informationarxiv: v1 [cs.cy] 11 Jun 2008
Analysis of Social Voting Patterns on Digg Kristina Lerman and Aram Galstyan University of Southern California Information Sciences Institute 4676 Admiralty Way Marina del Rey, California 9292, USA {lerman,galstyan}@isi.edu
More informationMAVA 102 Introduc0on to Media & Communica0ons. Week 2 - Media, Communica0on & Culture
MAVA 102 Introduc0on to Media & Communica0ons Week 2 - Media, Communica0on & Culture 1 Media Ubiquity Last week we started by discussing how much of our 6me we may spend using media. The average person
More informationLEVEL OF ANALYSIS - STATE AND NEW ACTORS
INTERNATIONAL POLITICS INRL 204 LEVEL OF ANALYSIS - STATE AND NEW ACTORS Assist. Prof. Dr. Gökay ÖZERİM Department of International Relations gokay.ozerim@yasar.edu.tr gozerim.yasar.edu.tr STATE (i) a
More informationCHICAGO NEWS LANDSCAPE
CHICAGO NEWS LANDSCAPE Emily Van Duyn, Jay Jennings, & Natalie Jomini Stroud January 18, 2018 SUMMARY The city of is demographically diverse. This diversity is particularly notable across three regions:
More informationPrivacy versus government surveillance where network effects meet public choice. Ross Anderson Cambridge
Privacy versus government surveillance where network effects meet public choice Ross Anderson Cambridge Two views of money and power The Bay Area view: money and power are all about network effects, which
More informationCapturing the Modern News Consumer
Capturing the Modern News Consumer Capturing the Modern News Consumer 1. Who Do We Need to Reach? This is the most educated, informed generation that has ever lived. To think that young people have no
More informationTestimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute
Testimony of Kevin S. Bankston, Policy Director of New America s Open Technology Institute On Proposed Amendments to Rule 41 of the Federal Rules of Criminal Procedure Before The Judicial Conference Advisory
More informationANNUAL SURVEY REPORT: GEORGIA
ANNUAL SURVEY REPORT: GEORGIA 2 nd Wave (Spring 2017) OPEN Neighbourhood Communicating for a stronger partnership: connecting with citizens across the Eastern Neighbourhood June 2017 TABLE OF CONTENTS
More informationWORLD LIBRARY AND INFORMATION CONGRESS: 73RD IFLA GENERAL CONFERENCE AND COUNCIL
Date : 08/06/2007 Access to information as a driver towards closing of the gender equality gap: the emerging scene in Kenya Wambui Wagacha Head of Library and Documentation Kenya Institute for Public Policy
More information