175 resultados para Theft.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce Kamouflage: a new architecture for building theft-resistant password managers. An attacker who steals a laptop or cell phone with a Kamouflage-based password manager is forced to carry out a considerable amount of online work before obtaining any user credentials. We implemented our proposal as a replacement for the built-in Firefox password manager, and provide performance measurements and the results from experiments with large real-world password sets to evaluate the feasibility and effectiveness of our approach. Kamouflage is well suited to become a standard architecture for password managers on mobile devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing is deceptive collection of personal information leading to embezzlement, identity theft, and so on. Preventive and combative measures have been taken by banking institutions, software vendors, and network authorities to fight phishing. At the forefront of this resilience are consortiums such as APWG (Anti-Phishing Working Group) and PhishTank, the latter being a collaborative platform where everyone can submit potentially phishing web-pages and classify web-pages as either phish or genuine. PhishTank also has an API that the browsers use to notify users when she tries to load a phishing page. There are some organizations and individuals who are very active and highly accurate in classifying web-pages on PhishTank. In this paper, we propose a defense model that uses these experts to fight phishing.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Numeric set watermarking is a way to provide ownership proof for numerical data. Numerical data can be considered to be primitives for multimedia types such as images and videos since they are organized forms of numeric information. Thereby, the capability to watermark numerical data directly implies the capability to watermark multimedia objects and discourage information theft on social networking sites and the Internet in general. Unfortunately, there has been very limited research done in the field of numeric set watermarking due to underlying limitations in terms of number of items in the set and LSBs in each item available for watermarking. In 2009, Gupta et al. proposed a numeric set watermarking model that embeds watermark bits in the items of the set based on a hash value of the items’ most significant bits (MSBs). If an item is chosen for watermarking, a watermark bit is embedded in the least significant bits, and the replaced bit is inserted in the fractional value to provide reversibility. The authors show their scheme to be resilient against the traditional subset addition, deletion, and modification attacks as well as secondary watermarking attacks. In this paper, we present a bucket attack on this watermarking model. The attack consists of creating buckets of items with the same MSBs and determine if the items of the bucket carry watermark bits. Experimental results show that the bucket attack is very strong and destroys the entire watermark with close to 100% success rate. We examine the inherent weaknesses in the watermarking model of Gupta et al. that leave it vulnerable to the bucket attack and propose potential safeguards that can provide resilience against this attack.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing, a form of on-line identity theft, is a major problem worldwide, accounting for more than $7.5 Billion in losses in the US alone between 2005 and 2008. Australia was the first country to be targeted by Internet bank phishing in 2003 and continues to have a significant problem in this area. The major cyber crime groups responsible for phishing are based in Eastern Europe. They operate with a large degree of freedom due to the inherent difficulties in cross border law enforcement and the current situation in Eastern Europe, particularly in Russia and the Ukraine. They employ highly sophisticated and efficient technical tools to compromise victims and subvert bank authentication systems. However because it is difficult for them to repatriate the fraudulently obtained funds directly they employ Internet money mules in Australia to transfer the money via Western Union or Money gram. It is proposed a strategy, which firstly places more focus by Australian law enforcement upon transactions via Western Union and Money gram to detect this money laundering, would significantly impact the success of the Phishing attack model. This combined with a technical monitoring of Trojan technology and education of potential Internet money mules to avoid being duped would provide a winning strategy for the war on phishing for Australia.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

There has been tremendous interest in watermarking multimedia content during the past two decades, mainly for proving ownership and detecting tamper. Digital fingerprinting, that deals with identifying malicious user(s), has also received significant attention. While extensive work has been carried out in watermarking of images, other multimedia objects still have enormous research potential. Watermarking database relations is one of the several areas which demand research focus owing to the commercial implications of database theft. Recently, there has been little progress in database watermarking, with most of the watermarking schemes modeled after the irreversible database watermarking scheme proposed by Agrawal and Kiernan. Reversibility is the ability to re-generate the original (unmarked) relation from the watermarked relation using a secret key. As explained in our paper, reversible watermarking schemes provide greater security against secondary watermarking attacks, where an attacker watermarks an already marked relation in an attempt to erase the original watermark. This paper proposes an improvement over the reversible and blind watermarking scheme presented in [5], identifying and eliminating a critical problem with the previous model. Experiments showing that the average watermark detection rate is around 91% even with attacker distorting half of the attributes. The current scheme provides security against secondary watermarking attacks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the current market, extensive software development is taking place and the software industry is thriving. Major software giants have stated source code theft as a major threat to revenues. By inserting an identity-establishing watermark in the source code, a company can prove it's ownership over the source code. In this paper, we propose a watermarking scheme for C/C++ source codes by exploiting the language restrictions. If a function calls another function, the latter needs to be defined in the code before the former, unless one uses function pre-declarations. We embed the watermark in the code by imposing an ordering on the mutually independent functions by introducing bogus dependency. Removal of dependency by the attacker to erase the watermark requires extensive manual intervention thereby making the attack infeasible. The scheme is also secure against subtractive and additive attacks. Using our watermarking scheme, an n-bit watermark can be embedded in a program having n independent functions. The scheme is implemented on several sample codes and performance changes are analyzed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Australian households currently pay the second highest “honesty tax” in the world at $290 per household per year, levied by retailers to offset the $AU1.86 billion in losses they incur from customer theft. Theft is only one type of consumer deviance, which can include behaviours that are against the law, an organisation’s policy, or behaviours that violate normally accepted conduct. An individual’s “deviant behaviour” can vary from one person to the next. My research exploring consumer definitions of right and wrong has found a number of things can inform what an individual thinks is “deviant behaviour”, beyond what the law or organisational policy states as right or wrong. Consumers then use their own justifications to excuse their actions...

Relevância:

10.00% 10.00%

Publicador:

Resumo:

What is ‘best practice’ when it comes to managing intellectual property rights in participatory media content? As commercial media and entertainment business models have increasingly come to rely upon the networked productivity of end-users (Banks and Humphreys 2008) this question has been framed as a problem of creative labour made all the more precarious by changing employment patterns and work cultures of knowledge-intensive societies and globalising economies (Banks, Gill and Taylor 2014). This paper considers how the problems of ownership are addressed in non-commercial, community-based arts and media contexts. Problems of labour are also manifest in these contexts (for example, reliance on volunteer labour and uncertain economic reward for creative excellence). Nonetheless, managing intellectual property rights in collaborative creative works that are created in community media and arts contexts is no less challenging or complex than in commercial contexts. This paper takes as its focus a particular participatory media practice known as ‘digital storytelling’. The digital storytelling method, formalised by the Centre for Digital Storytelling (CDS) from the mid-1990s, has been internationally adopted and adapted for use in an open-ended variety of community arts, education, health and allied services settings (Hartley and McWilliam 2009; Lambert 2013; Lundby 2008; Thumin 2012). It provides a useful point of departure for thinking about a range of collaborative media production practices that seek to address participation ‘gaps’ (Jenkins 2006). However the outputs of these activities, including digital stories, cannot be fully understood or accurately described as user-generated content. For this reason, digital storytelling is taken here to belong to a category of participatory media activity that has been described as ‘co-creative’ media (Spurgeon 2013) in order to improve understanding of the conditions of mediated and mediatized participation (Couldry 2008). This paper reports on a survey of the actual copyrighting practices of cultural institutions and community-based media arts practitioners that work with digital storytelling and similar participatory content creation methods. This survey finds that although there is a preference for Creative Commons licensing a great variety of approaches are taken to managing intellectual property rights in co-creative media. These range from the use of Creative Commons licences (for example, Lambert 2013, p.193) to retention of full copyrights by storytellers, to retention of certain rights by facilitating organisations (for example, broadcast rights by community radio stations and public service broadcasters), and a range of other shared rights arrangements between professional creative practitioners, the individual storytellers and communities with which they collaborate, media outlets, exhibitors and funders. This paper also considers how aesthetic and ethical considerations shape responses to questions of intellectual property rights in community media arts contexts. For example, embedded in the CDS digital storytelling method is ‘a critique of power and the numerous ways that rank is unconsciously expressed in engagements between classes, races and gender’ (Lambert 117). The CDS method privileges the interests of the storyteller and, through a transformative workshop process, aims to generate original individual stories that, in turn, reflect self-awareness of ‘how much the way we live is scripted by history, by social and cultural norms, by our own unique journey through a contradictory, and at times hostile, world’ (Lambert 118). Such a critical approach is characteristic of co-creative media practices. It extends to a heightened awareness of the risks of ‘story theft and the challenges of ownership and informs ideas of ‘best practice’ amongst creative practitioners, teaching artists and community media producers, along with commitments to achieving equitable solutions for all participants in co-creative media practice (for example, Lyons-Reid and Kuddell nd.). Yet, there is surprisingly little written about the challenges of managing intellectual property produced in co-creative media activities. A dialogic sense of ownership in stories has been identified as an indicator of successful digital storytelling practice (Hayes and Matusov 2005) and is helpful to grounding the more abstract claims of empowerment for social participation that are associated with co-creative methods. Contrary to the ‘change from below’ philosophy that underpins much thinking about co-creative media, however, discussions of intellectual property usually focus on how methods such as digital storytelling contribute to the formation of copyright law-compliant subjects, particularly when used in educational settings (for example, Ohler nd.). This also exposes the reliance of co-creative methods on the creative assets storytellers (rather than on the copyrighted materials of the media cultures of storytellers) as a pragmatic response to the constraints that intellectual property right laws impose on the entire category of participatory media. At the level of practical politics, it also becomes apparent that co-creative media practitioners and storytellers located in copyright jurisdictions governed by ‘fair use’ principles have much greater creative flexibility than those located in jurisdictions governed by ‘fair dealing’ principles.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Prostitution has been closely associated with the transportation of women convicts to British penal colonies. Convict labor was used to found a number of British colonies including Barbados, Jamaica, Maryland, Virginia, Singapore, New South Wales, Tasmania, and Western Australia. Between 1607 and 1939, Britain transported approximately 400,000 convicts, 162,000 of whom came to Australia and about 50,000 to North America. Significant numbers of women were among those transported to the Australian and North American colonies, although their numbers were relatively small in comparison to male convicts. Transportation was typically reserved for the most recalcitrant of female offenders. Most women transported came from working-class populations, resided in metropolitan centers, and were single at the time of their offense. Although few of these women were actually sentenced for activities associated with prostitution, large numbers had a history of involvement with prostitution. Transportation was considered to offer prostitutes a chance at redemption, with colonial commentators drawing contrasts between the Old World and its vice-ridden sensuality and the colonies, which offered opportunities for redemption through religious devotion and hard work. Many women transported to the Australian colonies were described by officials as being "on the town" at their time of apprehension and were collectively considered to be "damned whores, possessed of neither virtue nor honesty". Recently, historians have argued that these assessments were emblematic of middle-class prejudices toward the open and aggressive sexuality of working-class women. The number of convict women involved in prostitution may have been higher than recorded crimes, typically involving "larceny", suggest. A number of women were charged with theft from men who had paid them (or, in some instances, refused to pay them) for sex. Historians have estimated that one in five convict women were part-time or full-time prostitutes before transportation. Many continued in prostitution after transportation, with prostitution becoming an important element in the social and economic life of the Australian colonies, where, between 1788-1830, men outnumbered women six to one. Officially, prostitution was tolerated to dissuade men from vice. For women, prostitution presented a means of securing physical protection and accommodation at a time when general amenities and employment opportunities were restricted.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose This study aims to use opportunity as a theoretical lens to investigate how the spatio-temporal and social dimensions of the consumption environment create perceived opportunities for consumers to misbehave. Design/methodology/approach Drawing on routine activity theory and social impact theory, the authors use two experiments to demonstrate that spatio-temporal and social dimensions can explain consumer theft in retail settings. Findings Study 1 reveals mixed empirical support for the basic dimensions of routine activity theory, which posits that the opportunity to thieve is optimised when a motivated offender, suitable target and the absence of a capable formal guardian transpire in time and space. Extending the notion of guardianship, Study 2 tests social impact theory and shows that informal guardianship impacts the likelihood of theft under optimal routine activity conditions. Originality/value The study findings highlight important implications for academicians and retail managers: rather than focusing on the uncontrollable characteristics of thieving offenders, more controllable spatio-temporal and social factors of the retail environment can be actively monitored and manipulated to reduce perceived opportunities for consumer misbehaviour.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining their properties in a range of configurations, we discovered a flaw in a common network protocol and produced a technique to improve organisations' network security against data theft.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Eastern Mafia Threat policy, crime phenomena, and cultural meanings An interdisciplinary research on the crime phenomena and the threat policy relating to the organized crime and the mafia of Russia and Estonia is based on 151 expert interviews, statistics, documents, research literature, and press material. The main part of the material consists of interviews of the Finnish, Estonian and Russian police authorities specialized in the problem of organized crime, and the reports on the crime situation drawn up in the Finnish diplomatic representations in Tallinn and St Petersburg. The interviews have been gathered in the years 1996-2001. The main theoretical tools of the research are constructivist research on social problems, and political psychology. Definitional processes of social problems and cultural semantic structures behind them are identified in the analysis and connected to the analysis of the crime cases. Both in the Anglo-American and Russian cultural frames there appears an inflated and exaggerated talk, according to which the mafia rules everything in Russia and is spreading everywhere. There is the traditional anti-Semitic paranoia in the core of this cultural symbiosis produced by Russian legal nihilism, the theory of totalitarianism of Sovietology, and the inertia of Russian anti-capitalism. To equate the Sicilian Mafia with Russia is an anachronism, since no empirical proof of systematic uncontrolled violence or absolute power vacuum in Russia can be found. In the Anglo-American policy of threat images, "the Russian mafia" was seen as a commodified conspiracy theory, which the police, the media, and the research took advantage of, blurring the line between fact and fiction. In Finland, the evolution of the policy of threat images proceeded in three phases: Initially, extensive rolling of refugees and criminals from Russia to Finland was emphasized in the beginning of the 1990's. In the second phase, the eastern mafia was said to infiltrate all over Finnish society and administration. Finland was, however, found immune to this kind of spreading. In the third phase, in the 21st century, the organized crime of Finland was said to be lead from abroad. In Finland, the policy of threat images was especially canalised to moral panics connected to "eastern prostitution". In Estonia, the policy of threat images emphasized the crime organized by the Russian authorities and politicians in order to weaken Estonia. In Russia, the policy of threat images emphasized the total criminalizing of society caused by criminal capitalism. In every country, the policy of threat images was affected by a so-called large-group identity, a term by Vamik Volkan, in which a so-called chosen trauma caused a political paranoia of an outer and inner danger. In Finland, procuring, car theft, and narcotics crimes were at their widest arranged by the Finnish often with the help of the Estonians. The Russians had no influence in the most serious violent crimes in Finland, although the number of assassinations were at least 5, 000 in Russia in the 1990's. In Russia, the assassinations were on one hand connected to marital problems, on the other hand to the pursuit of public attention and a hoped-for effect by the aid of the murder of an influential person. In the white-collar crime phenomena between Finland and Russia, the Finnish state and Finnish corporations gained remarkable benefit of the frauds aimed at the states of the Soviet Union and Russia in 1980's-21st century. The situation of Estonia was very difficult compared to that of Russia in the 1990's, which was manifested in the stagnation of the Estonian police and judicial authorities, the crimes of the police and the voluntary paramilitary organization, bomb explosions, the rebellion called "the jaeger crisis" in the voluntary paramilitary organization, and the "blood autumn" of Eastern Virumaa, in other words terror. The situation of Estonia had a powerful effect on the crime situation of Finland and on the security of the Finnish diplomats. In the continuum of the Finnish policy of threat images, Russia and the Russians were, however, presented as a source of a marked danger.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: En el presente artículo el autor se ocupa de reseñar las circunstancias que rodearon el robo de la corona de la Virgen de Luján, bendecida por el papa León XIII en 1887. Diez años después de la solemne fiesta de la coronación pontificia esta primorosa joya, confeccionada por el acreditado orfebre parisino Poussielgue-Rusand, fue sustraída del camarín donde se veneraba la Sagrada Imagen. La recuperación y restitución motivó la organización de una multitudinaria peregrinación al Santuario de Luján que puso de manifiesto la profunda devoción del pueblo argentino a su Patrona.