945 resultados para Internet users -- Attitudes


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The representation in online environments of non-Roman-based script languages has proved problematic. During the initial years of Computer-mediated Communication, the American Standard Code for Information Interchange character set only supported Roman-alphabeted languages. The solution for speakers of languages written in non-Roman scripts was to employ unconventional writing systems, in an effort to represent their native language in online discourse. The first aim of this chapter is to present the different ways that internet users choose to transliterate or even transcribe their native languages online, using Roman characters. With technological development, and consequently the availability of various writing scripts online, internet users now have the option to either use Roman characters or their native script. If the latter is chosen, internet users still seem to deviate from conventional ways of writing, in this case, however, with regards to spelling. The second aim, therefore, is to bring into light recent developments, by looking at the ways that internet users manipulate orthography, to achieve their communicative purposes.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The Cypriot Greek variety (CG), spoken in the island of Cyprus, is relatively distinct from Standard Greek (SG) in all linguistic domains and, especially, in the area of pronunciation. Youth language, within the Greek-Cypriot context, is an area of study that has, until recently, received little attention. Tsiplakou (2004) makes reference to the emergence of a new slang among young Greek-Cypriots, influenced by new comedy series, in which the actors make extensive use of ‘exaggeratedly peasant’ CG. As these comedy series become increasingly popular, the use of marked regional features becomes evident in the speech style of young Greek-Cypriots. A preliminary study has also revealed that marked CG linguistic features are equally evident in the online interactions of young internet users (Themistocleous 2005). In this study, I examine the use of CG phonological elements in a corpus of messages collected from channel #Cyprus, of Internet Relay Chat (IRC). It is demonstrated that young Greek-Cypriots use language in creative ways, in order to represent in writing phonological features, typical of their informal speech.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Fan culture is a subculture that has developed explosively on the internet over the last decades. Fans are creating their own films, translations, fiction, fan art, blogs, role play and also various forms that are all based on familiar popular culture creations like TV-series, bestsellers, anime, manga stories and games. In our project, we analyze two of these subculture genres, fan fiction and scanlation. Amateurs, and sometimes professional writers, create new stories by adapting and developing existing storylines and characters from the original. In this way, a "network" of texts occurs, and writers step into an intertextual dialogue with established writers such as JK Rowling (Harry Potter) and Stephanie Meyer (Twilight). Literary reception and creation then merge into a rich reciprocal creative activity which includes comments and feedback from the participators in the community. The critical attitude of the fans regarding quality and the frustration at waiting for the official translation of manga books led to the development of scanlation, which is an amateur translation of manga distributed on the internet.  Today, young internet users get involved in conceptual discussions of intertextuality and narrative structures through fan activity. In the case of scanlation, the scanlators practice the skills and techniques of translating in an informal environment. This phenomenon of participatory culture has been observed by scholars and it is concluded that they contribute to the development of a student’s literacy and foreign language skills. Furthermore, there is no doubt that the fandom related to Japanese cultural products such as manga, anime and videogames is one of the strong motives for foreign students to start learning Japanese. This is something to take into pedagogical consideration when we develop web-based courses. Fan fiction and fan culture make it ​​possible to have an intensive transcultural dialogue between participators throughout the world and is of great interest when studying the interaction between formal and informal learning that puts the student in focus

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Social network worms, such as email worms and facebook worms, pose a critical security threat to the Internet. Modeling their propagation dynamics is essential to predict their potential damages and develop countermeasures. Although several analytical models have been proposed for modeling propagation dynamics of social network worms, there are two critical problems unsolved: temporal dynamics and spatial dependence. First, previous models have not taken into account the different time periods of Internet users checking emails or social messages, namely, temporal dynamics. Second, the problem of spatial dependence results from the improper assumption that the states of neighboring nodes are independent. These two problems seriously affect the accuracy of the previous analytical models. To address these two problems, we propose a novel analytical model. This model implements a spatial-temporal synchronization process, which is able to capture the temporal dynamics. Additionally, we find the essence of spatial dependence is the spreading cycles. By eliminating the effect of these cycles, our model overcomes the computational challenge of spatial dependence and provides a stronger approximation to the propagation dynamics. To evaluate our susceptible-infectious-immunized (SII) model, we conduct both theoretical analysis and extensive simulations. Compared with previous epidemic models and the spatial-temporal model, the experimental results show our SII model achieves a greater accuracy. We also compare our model with the susceptible-infectious-susceptible and susceptible-infectious- recovered models. The results show that our model is more suitable for modeling the propagation of social network worms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Increasingly, web applications are being developed over the Internet. Securing these web applications is becoming important as they hold critical security features. However, cybercriminals are becoming smarter by developing a crime toolkit, and employing sophisticated techniques to evade detection. These crime toolkits can be used by any person to target Internet users. In this paper, we explore the techniques used in crime toolkits. We present a current state-of-the-art analysis of crime toolkits and focus on attacks against web applications. The crime toolkit techniques are compared with the vulnerability of web applications to help reveal particular behaviour such as popular web application vulnerabilities that malicious writers prefer. In addition, we outline the existing protection mechanism, and observe that the possibility for damage is rising, particularly as specialization and scale increase in cybercrime.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tagging recommender systems allow Internet users to annotate resources with personalized tags. The connection among users, resources and these annotations, often called afolksonomy, permits users the freedom to explore tags, and to obtain recommendations. Releasing these tagging datasets accelerates both commercial and research work on recommender systems. However, adversaries may re-identify a user and her/his sensitivity information from the tagging dataset using a little background information. Recently, several private techniques have been proposed to address the problem, but most of them lack a strict privacy notion, and can hardly resist the number of possible attacks. This paper proposes an private releasing algorithm to perturb users' profile in a strict privacy notion, differential privacy, with the goal of preserving a user's identity in a tagging dataset. The algorithm includes three privacy preserving operations: Private Tag Clustering is used to shrink the randomized domain and Private Tag Selection is then applied to find the most suitable replacement tags for the original tags. To hide the numbers of tags, the third operation, Weight Perturbation, finally adds Lap lace noise to the weight of tags We present extensive experimental results on two real world datasets, Delicious and Bibsonomy. While the personalization algorithmis successful in both cases.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Phishing attacks continue unabated to plague Internet users and trick them into providing personal and confidential information to phishers. In this paper, an approach for email-born phishing detection based on profiling and clustering techniques is proposed. We formulate the profiling problem as a clustering problem using various features present in the phishing emails as feature vectors and generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of the emails. We carried out extensive experimental analysis of the proposed approach in order to evaluate its effectiveness to various factors such as sensitivity to the type of data, number of data sizes and cluster sizes. We compared the performance of the proposed approach against the Modified Global Kmeans (MGKmeans) approach. The results show that the proposed approach is efficient as compared to the baseline approach. © 2014 Elsevier Ltd. All rights reserved.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tagging recommender system allows Internet users to annotate resources with personalized tags and provides users the freedom to obtain recommendations. However, It is usually confronted with serious privacy concerns, because adversaries may re-identify a user and her/his sensitive tags with only a little background information. This paper proposes a privacy preserving tagging release algorithm, PriTop, which is designed to protect users under the notion of differential privacy. The proposed PriTop algorithm includes three privacy preserving operations: Private Topic Model Generation structures the uncontrolled tags, Private Weight Perturbation adds Laplace noise into the weights to hide the numbers of tags; while Private Tag Selection finally finds the most suitable replacement tags for the original tags. We present extensive experimental results on four real world datasets and results suggest the proposed PriTop algorithm can successfully retain the utility of the datasets while preserving privacy. © 2014 Springer International Publishing.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Tagging recommender systems allow Internet users to annotate resources with personalized tags. The connection among users, resources and these annotations, often called a folksonomy, permits users the freedom to explore tags, and to obtain recommendations. Releasing these tagging datasets accelerates both commercial and research work on recommender systems. However, tagging recommender systems has been confronted with serious privacy concerns because adversaries may re-identify a user and her/his sensitive information from the tagging dataset using a little background information. Recently, several private techniques have been proposed to address the problem, but most of them lack a strict privacy notion, and can hardly resist the number of possible attacks. This paper proposes an private releasing algorithm to perturb users' profile in a strict privacy notion, differential privacy, with the goal of preserving a user's identity in a tagging dataset. The algorithm includes three privacy-preserving operations: Private Tag Clustering is used to shrink the randomized domain and Private Tag Selection is then applied to find the most suitable replacement tags for the original tags. To hide the numbers of tags, the third operation, Weight Perturbation, finally adds Laplace noise to the weight of tags. We present extensive experimental results on two real world datasets, De.licio.us and Bibsonomy. While the personalization algorithm is successful in both cases, our results further suggest the private releasing algorithm can successfully retain the utility of the datasets while preserving users' identity.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Code injection attacks are considered serious threats to the Internet users. In this type of attack the attacker injects malicious codes in the user programs to change or divert the execution flows. In this paper we explore the contemporary defence strategies against code injection attacks (CIAs) and underline their limitations. To overcome these limitations, we suggest a number of countermeasure mechanisms for protecting from CIAs. Our key idea relies on the multiplexing technique to preserve the exact return code to ensure the integrity of program execution trace of shell code. This technique also maintains a FIFO (first in first out) queue to defeat the conflict state when multiple caller method makes a call simultaneously. Finally, our technique can provide better performance, in terms of protection and speed, in some point compared to the CFI (control flow integrity) as well as CPM (code pointer masking) techniques.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Each year search engines like Google, Bing and Yahoo, complete trillions of search queries online. Students are especially dependent on these search tools because of their popularity, convenience and accessibility. However, what students are unaware of, by choice or naiveté is the amount of personal information that is collected during each search session, how that data is used and who is interested in their online behavior profile. Privacy policies are frequently updated in favor of the search companies but are lengthy and often are perused briefly or ignored entirely with little thought about how personal web habits are being exploited for analytics and marketing. As an Information Literacy instructor, and a member of the Electronic Frontier Foundation, I believe in the importance of educating college students and web users in general that they have a right to privacy online. Class discussions on the topic of web privacy have yielded an interesting perspective on internet search usage. Students are unaware of how their online behavior is recorded and have consistently expressed their hesitancy to use tools that disguise or delete their IP address because of the stigma that it may imply they have something to hide or are engaging in illegal activity. Additionally, students fear they will have to surrender the convenience of uber connectivity in their applications to maintain their privacy. The purpose of this lightning presentation is to provide educators with a lesson plan highlighting and simplifying the privacy terms for the three major search engines, Google, Bing and Yahoo. This presentation focuses on what data these search engines collect about users, how that data is used and alternative search solutions, like DuckDuckGo, for increased privacy. Students will directly benefit from this lesson because informed internet users can protect their data, feel safer online and become more effective web searchers.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Este estudo objetivou verificar a percepção do consumidor sobre a relação entre as variáveis independentes: uso de dados secundários não autorizados, percepção de invasão de privacidade, percepção de proteção de privacidade, percepção de confidencialidade, percepção de autenticação, percepção de erro, comportamento intencional de uso e a variável dependente propensão à compra on line. Realizou-se um levantamento com aplicação de questionários em uma amostra de 451 usuários de Internet, alunos de graduação e de pós-graduação das Instituições de Ensino Superior de São Luís, Maranhão. A análise estatística englobou Análise Descritiva e Regressão Múltipla. Concluiu-se que apenas uma variável, comportamento intencional de uso, está correlacionada à variável dependente. Algumas limitações, implicações e sugestões de pesquisa futura foram analisadas neste estudo.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

O status tecnológico da sociedade contemporânea, imersa no mundo virtual, ao mesmo tempo que cria novas oportunidades para as empresas e mais comodidade aos usuários, também gera interesses conflitantes entre essas duas partes e incita ao surgimento de paradoxos na relação de ambas com a privacidade. Um dos reflexos desse cenário é a falta de confiança do consumidor em expor seus dados pessoais no ambiente on-line, o que, por sua vez, atua como um obstáculo ao pleno potencial do comércio eletrônico. Uma das possíveis saídas para o dilema, apontada por vários estudiosos, estaria na busca do chamado caminho virtuoso do meio, representado por soluções eficazes e satisfatórias para todas as instâncias envolvidas. Como parte de tal caminho, que configura um processo de conhecimento do sentido e do valor da privacidade nos dias atuais, encontram-se os estudos de tipologia, que, apesar de numericamente pequenos — sobretudo tendo a Internet como foco —, representam esforços para se chegar a uma conceituação sobre o que é a natureza do privado. Desse entendimento dependem a elaboração e a fundamentação de estratégias para o implemento de soluções em sintonia com as inúmeras demandas sociais de hoje. O objetivo do presente trabalho, portanto, é replicar um determinado modelo de tipologia de privacidade no cenário do Brasil após pesquisa do tema em nível global. A escolha recaiu sobre um estudo de Sheehan (2002), desenvolvido nos Estados Unidos junto a um público de intermautas. Na transposição do modelo para um grupo de 190 indivíduos no Brasil, verificou-se que, dentre as quatro variáveis abordadas no estudo original (gênero, idade, grau de escolaridade e renda familiar), apenas a idade teve significância para a privacidade, com pouco mais de 20% de variabilidade. Já o nível de escolaridade, que se mostrou importante no trabalho norte-americano, não apresentou qualquer relevância entre o público brasileiro. As divergências nos resultados podem ser atribuídas a diferentes fatores, com ênfase ao papel exercido pelos sistemas culturais. Considerá-las, pois, pode embasar futuros estudos que, à semelhança deste, procurem responder ao desafio da privacidade no campo virtual e beneficiem tanto indivíduos como o fortalecimento do e-commerce.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Esta pesquisa teve como objetivo identificar e analisar a forma como a Fiat construiu compartilhadamente uma noção de satisfação com os seus consumidores através do site Fiatmio.cc, um ambiente virtual em que usuários da internet foram convidados a dar sugestões para criação de um carro protótipo do futuro. Foram analisados os conteúdos das transcrições de 16 vídeos de especialistas, exibidos no site, e de 98 comentários postados por usuários, a respeito de discussões levantadas pela Fiat. O trabalho aponta e compara os principais conceitos presentes nas mensagens divulgadas pela montadora e nos comentários dos usuários; identifica a forma como ocorreu essa interação discursiva; e analisa a forma como a empresa construiu o seu posicionamento neste projeto e a noção de satisfação desses consumidores.