25 resultados para theft
Resumo:
Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.
Resumo:
There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.
Resumo:
In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Australian households currently pay the second highest “honesty tax” in the world at $290 per household per year, levied by retailers to offset the $AU1.86 billion in losses they incur from customer theft. Theft is only one type of consumer deviance, which can include behaviours that are against the law, an organisation’s policy, or behaviours that violate normally accepted conduct. An individual’s “deviant behaviour” can vary from one person to the next. My research exploring consumer definitions of right and wrong has found a number of things can inform what an individual thinks is “deviant behaviour”, beyond what the law or organisational policy states as right or wrong. Consumers then use their own justifications to excuse their actions...
Resumo:
What is ‘best practice’ when it comes to managing intellectual property rights in participatory media content? As commercial media and entertainment business models have increasingly come to rely upon the networked productivity of end-users (Banks and Humphreys 2008) this question has been framed as a problem of creative labour made all the more precarious by changing employment patterns and work cultures of knowledge-intensive societies and globalising economies (Banks, Gill and Taylor 2014). This paper considers how the problems of ownership are addressed in non-commercial, community-based arts and media contexts. Problems of labour are also manifest in these contexts (for example, reliance on volunteer labour and uncertain economic reward for creative excellence). Nonetheless, managing intellectual property rights in collaborative creative works that are created in community media and arts contexts is no less challenging or complex than in commercial contexts. This paper takes as its focus a particular participatory media practice known as ‘digital storytelling’. The digital storytelling method, formalised by the Centre for Digital Storytelling (CDS) from the mid-1990s, has been internationally adopted and adapted for use in an open-ended variety of community arts, education, health and allied services settings (Hartley and McWilliam 2009; Lambert 2013; Lundby 2008; Thumin 2012). It provides a useful point of departure for thinking about a range of collaborative media production practices that seek to address participation ‘gaps’ (Jenkins 2006). However the outputs of these activities, including digital stories, cannot be fully understood or accurately described as user-generated content. For this reason, digital storytelling is taken here to belong to a category of participatory media activity that has been described as ‘co-creative’ media (Spurgeon 2013) in order to improve understanding of the conditions of mediated and mediatized participation (Couldry 2008). This paper reports on a survey of the actual copyrighting practices of cultural institutions and community-based media arts practitioners that work with digital storytelling and similar participatory content creation methods. This survey finds that although there is a preference for Creative Commons licensing a great variety of approaches are taken to managing intellectual property rights in co-creative media. These range from the use of Creative Commons licences (for example, Lambert 2013, p.193) to retention of full copyrights by storytellers, to retention of certain rights by facilitating organisations (for example, broadcast rights by community radio stations and public service broadcasters), and a range of other shared rights arrangements between professional creative practitioners, the individual storytellers and communities with which they collaborate, media outlets, exhibitors and funders. This paper also considers how aesthetic and ethical considerations shape responses to questions of intellectual property rights in community media arts contexts. For example, embedded in the CDS digital storytelling method is ‘a critique of power and the numerous ways that rank is unconsciously expressed in engagements between classes, races and gender’ (Lambert 117). The CDS method privileges the interests of the storyteller and, through a transformative workshop process, aims to generate original individual stories that, in turn, reflect self-awareness of ‘how much the way we live is scripted by history, by social and cultural norms, by our own unique journey through a contradictory, and at times hostile, world’ (Lambert 118). Such a critical approach is characteristic of co-creative media practices. It extends to a heightened awareness of the risks of ‘story theft’ and the challenges of ownership and informs ideas of ‘best practice’ amongst creative practitioners, teaching artists and community media producers, along with commitments to achieving equitable solutions for all participants in co-creative media practice (for example, Lyons-Reid and Kuddell nd.). Yet, there is surprisingly little written about the challenges of managing intellectual property produced in co-creative media activities. A dialogic sense of ownership in stories has been identified as an indicator of successful digital storytelling practice (Hayes and Matusov 2005) and is helpful to grounding the more abstract claims of empowerment for social participation that are associated with co-creative methods. Contrary to the ‘change from below’ philosophy that underpins much thinking about co-creative media, however, discussions of intellectual property usually focus on how methods such as digital storytelling contribute to the formation of copyright law-compliant subjects, particularly when used in educational settings (for example, Ohler nd.). This also exposes the reliance of co-creative methods on the creative assets storytellers (rather than on the copyrighted materials of the media cultures of storytellers) as a pragmatic response to the constraints that intellectual property right laws impose on the entire category of participatory media. At the level of practical politics, it also becomes apparent that co-creative media practitioners and storytellers located in copyright jurisdictions governed by ‘fair use’ principles have much greater creative flexibility than those located in jurisdictions governed by ‘fair dealing’ principles.
Resumo:
Prostitution has been closely associated with the transportation of women convicts to British penal colonies. Convict labor was used to found a number of British colonies including Barbados, Jamaica, Maryland, Virginia, Singapore, New South Wales, Tasmania, and Western Australia. Between 1607 and 1939, Britain transported approximately 400,000 convicts, 162,000 of whom came to Australia and about 50,000 to North America. Significant numbers of women were among those transported to the Australian and North American colonies, although their numbers were relatively small in comparison to male convicts. Transportation was typically reserved for the most recalcitrant of female offenders. Most women transported came from working-class populations, resided in metropolitan centers, and were single at the time of their offense. Although few of these women were actually sentenced for activities associated with prostitution, large numbers had a history of involvement with prostitution. Transportation was considered to offer prostitutes a chance at redemption, with colonial commentators drawing contrasts between the Old World and its vice-ridden sensuality and the colonies, which offered opportunities for redemption through religious devotion and hard work. Many women transported to the Australian colonies were described by officials as being "on the town" at their time of apprehension and were collectively considered to be "damned whores, possessed of neither virtue nor honesty". Recently, historians have argued that these assessments were emblematic of middle-class prejudices toward the open and aggressive sexuality of working-class women. The number of convict women involved in prostitution may have been higher than recorded crimes, typically involving "larceny", suggest. A number of women were charged with theft from men who had paid them (or, in some instances, refused to pay them) for sex. Historians have estimated that one in five convict women were part-time or full-time prostitutes before transportation. Many continued in prostitution after transportation, with prostitution becoming an important element in the social and economic life of the Australian colonies, where, between 1788-1830, men outnumbered women six to one. Officially, prostitution was tolerated to dissuade men from vice. For women, prostitution presented a means of securing physical protection and accommodation at a time when general amenities and employment opportunities were restricted.
Resumo:
Purpose This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities for consumers to misbehave. Design/methodology/approach Drawing on routine activity theory and social impact theory, the authors use two experiments to demonstrate that spatio-temporal and social dimensions can explain consumer theft in retail settings. Findings Study 1 reveals mixed empirical support for the basic dimensions of routine activity theory, which posits that the opportunity to thieve is optimised when a motivated offender, suitable target and the absence of a capable formal guardian transpire in time and space. Extending the notion of guardianship, Study 2 tests social impact theory and shows that informal guardianship impacts the likelihood of theft under optimal routine activity conditions. Originality/value The study findings highlight important implications for academicians and retail managers: rather than focusing on the uncontrollable characteristics of thieving offenders, more controllable spatio-temporal and social factors of the retail environment can be actively monitored and manipulated to reduce perceived opportunities for consumer misbehaviour.
Resumo:
In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining their properties in a range of configurations, we discovered a flaw in a common network protocol and produced a technique to improve organisations' network security against data theft.