04/01/2024; event: 57th Annual Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, University of Manoa
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
Week 6 Guidance
Psychological Research
There are many ways to conduct research including but not limited to an experiment, survey, case study and naturalistic observation. Before any researcher decides how research will be conducted, he or she will look at the purpose of the study, as well as the research questions and hypothesis. Each method has strengths, weaknesses and even limitations.
Researchers will consider and identify an operational definition. According to Schacter, Gilbert & Wegner (2009), an operational definition is a description of a property in terms of a concrete condition that can be measured. The first step involved in making any measurement is to identify the property, concept or thing we want to measure in concrete terms. The second step needed is to identify a way to measure what we would like to assess (Schacter, Gilbert & Wegner, 2009). This can be accomplished in a variety of ways in research.
It is essential to ensure that our data are measured in both valid and reliable ways. Validity refers to the idea that we are indeed measuring what we set out to measure. Reliability is the tendency for results to be consistent whenever and wherever it is measured.
One of the most important considerations involves the ethical issues of an experiment or study. According to American Psychological Association (APA) (2010), all research must follow the standards set forth in the APA Code of Ethics. Before any research with subjects can be complete, the Institutional Review Board (IRB) must approve all parts of the research design. Informed consent must be provided for all subjects. This involves sharing all aspects of the study, the purpose of the research, identification of the benefits that may come from the research, identification of any risks, how confidentiality will be upheld and identifying who can be contacted with questions, just to name a few. Researchers may not coerce participation in an any experiment or study. Researchers must ensure that no harm comes to anyone involved in the research as well. After an experiment is complete, researchers need to debrief all subjects and explain the true nature and purpose of the study.
If all guidelines are followed, we can obtain some fantastic and even life-changing information with continued current and proper research. This research is published in peer reviewed journals and we are able to stay on top of what is happening in the field of psychology. It truly is so exciting!
Case Study 1.2: National Security or Computer Security?
In 2017, the world was rocked by massive computer attacks, the largest hitting 2,000 organizations in 65 countries. Hackers shut down hospitals in Britain, the Chernobyl nuclear site, Ukraine’s national bank, a Russian energy company, Merck pharmaceutical, and the Danish shipping company Maersk. They locked up computer files at a number of U.S. businesses, releasing the information after users paid a ransom.
The cyber weapons used in these assaults w ...
The document describes the I3BAT and Nomad Eyes systems, which are designed to incorporate terrorist thinking and tactics to help prevent terrorist attacks. Nomad Eyes would involve widely distributing sensors and collecting data using mobile phones and other devices. This data would then be analyzed using statistical and mathematical models to identify patterns that could link people, objects, and events and help forecast terrorist plans and activities. The goal is for the general public to help detect threats through passive and anonymous data collection using everyday devices to supplement formal security and law enforcement efforts.
Approach to preparing for a biological attack (2017)Arete-Zoe, LLC
Approach to preparing for a biological attack
June 2017
Hospital risk management series
The debate on critical issues in science, health, and security encompasses many controversies and ethical challenges. The difference between a naturally occurring outbreak and criminal act of bioterrorism is often challenging to establish, and emergencies have to be handled as they come, regardless of the origin of the incident. The post-incident forensic analysis may or may not offer satisfactory answers in regards to attribution, liability, and the responsibility for compensation. The underlying issue for all ethical concerns examined in this work is the balance between individual rights and the needs of public health systems to protect others.
The mimetic virus A vector for cyberterrorismNicholas Ayres
The document discusses the potential for a "mimetic virus" to be used as a vector for cyberterrorism against the general public. It presents research involving a survey of 100 participants about their understanding and fear of cyberterrorism. The survey found that while participants had some knowledge of cyberterrorism, their fear of an attack was initially low. Participants were then shown a fabricated video claiming to depict a real computer virus that caused laptop batteries to explode. The data showed this increased participants' fear levels and likely to modify their future behaviors. The research suggests a mimetic virus could be an effective method for cyberterrorists to target and influence the general public, though the ability of such a virus to spread via social media is unclear.
Scientific advances in biotechnology that help develop new medical therapies can also enable new bioterrorism threats, as pathogens can be synthesized that are more resistant to detection and treatment. No country can expect to reach full biopreparedness due to the evolving nature of bioterrorism threats. The best defense is developing and utilizing different biopreparedness resources like rapid information sharing, proactive epidemiological monitoring, intelligence gathering, and microbial forensics.
The document discusses two articles related to cybercrime issues. The first article examines the possibility of establishing an international agreement or declaration for cyberspace to address cyber conflict and retaliation. The second article analyzes the legal and technical uncertainties surrounding strategic retaliatory countermeasures to cyber attacks for both nation-states and private entities. It discusses challenges in attributing attacks and risks of escalation, as well as limitations of applying international laws on use of force to the digital domain. The document also provides background on debates around active defense strategies following large-scale cyber attacks.
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
Cyber Security and Terrorism Research Article
2
Cyber Security and Terrorism Research Article
Senior Capstone
Introduction
Homeland Security has a wide range of organizations that fills in as a way to deal with shielding the United States locally and universally. These offices incorporate however are not restricted to U.S. Customs and Border Patrol, Transportation Security Administration, United States Coast Guard, Cybersecurity and Infrastructure, and so forth. These offices serves the administration in tending to at least one stages. For instance, The Federal Emergency Management Agency, otherwise called FEMA, is an organization that serves numerous partners in mitigating, planning, responding, and recovering from catastrophic events.
On a bigger degree, Cybersecurity is a developing and learning field that is utilized in Cybersecurity and Infrastructure and different organizations to shield significant specialized data from fear monger assaults, for example, hacking. Its primary unit of examination is the administration where relieving is the stage being polished. This principle point is basic to the Homeland Security and Emergency Management's (HSEM) discipline. As of now, there is an issue of how does Cybersecurity adequately change the danger of psychological militant assaults, wherein there are sure and negative credits to its methods for assurance. Innovation, organize security, basic frameworks including PC frameworks, and so forth is the thing that makes up Cybersecurity.
In spite of the fact that there might be a comprehension of what fear based oppression is, there has not yet been an unequivocal meaning of psychological oppression. As per Wilson, a few definitions for digital fear mongering can result from the assailants expectation while others centers on the impacts of the assault itself (Wilson, 2007). A few assaults can bring about mischief causing the death toll or harm while different assaults may bring about troublesome PCs and dread equivalents to fear based oppression. There should be a control on the yield of what dread is truly delegated with regards to an assault. When an infection occurs on a PC, is the proprietor of that PC apprehensive? On the off chance that the proprietor is apprehensive does it add up to a similar sort of dread starting at an aggressor from an alternate nation causing the infection? This can be alluded to what was the reason for that infection in any case.
When managing Cybersecurity and fear based oppression, there should be a decent measure of assaults occurring on the double or sequentially to cause dread inside the organization or nation. Digital fear mongers are seen assaulting different organizations consecutive for an extensive stretch in result accomplishing their objectives or if nothing else making consideration them (Lewis, 2002). In the event that the fear based oppressor neglects to increase any profit by their assault on a lot of PC frameworks, at that point it would n.
Week 6 GuidancePsychological ResearchThere are many ways to coladonnacamplin
Week 6 Guidance
Psychological Research
There are many ways to conduct research including but not limited to an experiment, survey, case study and naturalistic observation. Before any researcher decides how research will be conducted, he or she will look at the purpose of the study, as well as the research questions and hypothesis. Each method has strengths, weaknesses and even limitations.
Researchers will consider and identify an operational definition. According to Schacter, Gilbert & Wegner (2009), an operational definition is a description of a property in terms of a concrete condition that can be measured. The first step involved in making any measurement is to identify the property, concept or thing we want to measure in concrete terms. The second step needed is to identify a way to measure what we would like to assess (Schacter, Gilbert & Wegner, 2009). This can be accomplished in a variety of ways in research.
It is essential to ensure that our data are measured in both valid and reliable ways. Validity refers to the idea that we are indeed measuring what we set out to measure. Reliability is the tendency for results to be consistent whenever and wherever it is measured.
One of the most important considerations involves the ethical issues of an experiment or study. According to American Psychological Association (APA) (2010), all research must follow the standards set forth in the APA Code of Ethics. Before any research with subjects can be complete, the Institutional Review Board (IRB) must approve all parts of the research design. Informed consent must be provided for all subjects. This involves sharing all aspects of the study, the purpose of the research, identification of the benefits that may come from the research, identification of any risks, how confidentiality will be upheld and identifying who can be contacted with questions, just to name a few. Researchers may not coerce participation in an any experiment or study. Researchers must ensure that no harm comes to anyone involved in the research as well. After an experiment is complete, researchers need to debrief all subjects and explain the true nature and purpose of the study.
If all guidelines are followed, we can obtain some fantastic and even life-changing information with continued current and proper research. This research is published in peer reviewed journals and we are able to stay on top of what is happening in the field of psychology. It truly is so exciting!
Case Study 1.2: National Security or Computer Security?
In 2017, the world was rocked by massive computer attacks, the largest hitting 2,000 organizations in 65 countries. Hackers shut down hospitals in Britain, the Chernobyl nuclear site, Ukraine’s national bank, a Russian energy company, Merck pharmaceutical, and the Danish shipping company Maersk. They locked up computer files at a number of U.S. businesses, releasing the information after users paid a ransom.
The cyber weapons used in these assaults w ...
The document describes the I3BAT and Nomad Eyes systems, which are designed to incorporate terrorist thinking and tactics to help prevent terrorist attacks. Nomad Eyes would involve widely distributing sensors and collecting data using mobile phones and other devices. This data would then be analyzed using statistical and mathematical models to identify patterns that could link people, objects, and events and help forecast terrorist plans and activities. The goal is for the general public to help detect threats through passive and anonymous data collection using everyday devices to supplement formal security and law enforcement efforts.
Approach to preparing for a biological attack (2017)Arete-Zoe, LLC
Approach to preparing for a biological attack
June 2017
Hospital risk management series
The debate on critical issues in science, health, and security encompasses many controversies and ethical challenges. The difference between a naturally occurring outbreak and criminal act of bioterrorism is often challenging to establish, and emergencies have to be handled as they come, regardless of the origin of the incident. The post-incident forensic analysis may or may not offer satisfactory answers in regards to attribution, liability, and the responsibility for compensation. The underlying issue for all ethical concerns examined in this work is the balance between individual rights and the needs of public health systems to protect others.
The mimetic virus A vector for cyberterrorismNicholas Ayres
The document discusses the potential for a "mimetic virus" to be used as a vector for cyberterrorism against the general public. It presents research involving a survey of 100 participants about their understanding and fear of cyberterrorism. The survey found that while participants had some knowledge of cyberterrorism, their fear of an attack was initially low. Participants were then shown a fabricated video claiming to depict a real computer virus that caused laptop batteries to explode. The data showed this increased participants' fear levels and likely to modify their future behaviors. The research suggests a mimetic virus could be an effective method for cyberterrorists to target and influence the general public, though the ability of such a virus to spread via social media is unclear.
Scientific advances in biotechnology that help develop new medical therapies can also enable new bioterrorism threats, as pathogens can be synthesized that are more resistant to detection and treatment. No country can expect to reach full biopreparedness due to the evolving nature of bioterrorism threats. The best defense is developing and utilizing different biopreparedness resources like rapid information sharing, proactive epidemiological monitoring, intelligence gathering, and microbial forensics.
The document discusses two articles related to cybercrime issues. The first article examines the possibility of establishing an international agreement or declaration for cyberspace to address cyber conflict and retaliation. The second article analyzes the legal and technical uncertainties surrounding strategic retaliatory countermeasures to cyber attacks for both nation-states and private entities. It discusses challenges in attributing attacks and risks of escalation, as well as limitations of applying international laws on use of force to the digital domain. The document also provides background on debates around active defense strategies following large-scale cyber attacks.
Cyber Security and Terrorism Research Article2Cybe.docxrandyburney60861
Cyber Security and Terrorism Research Article
2
Cyber Security and Terrorism Research Article
Senior Capstone
Introduction
Homeland Security has a wide range of organizations that fills in as a way to deal with shielding the United States locally and universally. These offices incorporate however are not restricted to U.S. Customs and Border Patrol, Transportation Security Administration, United States Coast Guard, Cybersecurity and Infrastructure, and so forth. These offices serves the administration in tending to at least one stages. For instance, The Federal Emergency Management Agency, otherwise called FEMA, is an organization that serves numerous partners in mitigating, planning, responding, and recovering from catastrophic events.
On a bigger degree, Cybersecurity is a developing and learning field that is utilized in Cybersecurity and Infrastructure and different organizations to shield significant specialized data from fear monger assaults, for example, hacking. Its primary unit of examination is the administration where relieving is the stage being polished. This principle point is basic to the Homeland Security and Emergency Management's (HSEM) discipline. As of now, there is an issue of how does Cybersecurity adequately change the danger of psychological militant assaults, wherein there are sure and negative credits to its methods for assurance. Innovation, organize security, basic frameworks including PC frameworks, and so forth is the thing that makes up Cybersecurity.
In spite of the fact that there might be a comprehension of what fear based oppression is, there has not yet been an unequivocal meaning of psychological oppression. As per Wilson, a few definitions for digital fear mongering can result from the assailants expectation while others centers on the impacts of the assault itself (Wilson, 2007). A few assaults can bring about mischief causing the death toll or harm while different assaults may bring about troublesome PCs and dread equivalents to fear based oppression. There should be a control on the yield of what dread is truly delegated with regards to an assault. When an infection occurs on a PC, is the proprietor of that PC apprehensive? On the off chance that the proprietor is apprehensive does it add up to a similar sort of dread starting at an aggressor from an alternate nation causing the infection? This can be alluded to what was the reason for that infection in any case.
When managing Cybersecurity and fear based oppression, there should be a decent measure of assaults occurring on the double or sequentially to cause dread inside the organization or nation. Digital fear mongers are seen assaulting different organizations consecutive for an extensive stretch in result accomplishing their objectives or if nothing else making consideration them (Lewis, 2002). In the event that the fear based oppressor neglects to increase any profit by their assault on a lot of PC frameworks, at that point it would n.
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docxjeffsrosalyn
Saif Al Katheeri
Dr. Gina Gemmel
English 161
July, 15th 2019
Literature review: Online crime
Cybercrime has increased rapidly over the years, and wrangling debates are surrounding the issue. It has become part of everyday life. Different scholars have thoroughly examined the causes, prevalence, and potential solutions to cyber-crime. One of the most challenging issues for researchers is the increased penetration of the internet, increased use of smartphones and computers in a society with very naive users of online platforms. This is expected to lead to increased cybercrime cases. With the recent trends in online crime, most scholars in this field have dedicated their research to focus on the users of online platforms, the safety of personal information, and unauthorized privacy invasion. The review of literature from Academic sources will examine the prevalence of cybercrimes focusing on the soft targets of cyber-attack, unauthorized privacy invasion, characteristics of cybercrime victim, cybercrime trends globally and network intrusion facilitated through social engineering: which basically means using manipulation as an art figure to make a person do something or reveal confidential information. While all the sources reviewed agree that cybercrimes are a severe problem, they as well differ on the various ways to solve the problem.
For instance, some authors attribute the severity of cybercrimes to the inability of internet providers to protect their websites, while others claim that the personality of cybercrime victims often make them susceptible to attacks. In their article on Cybersecurity: Risks, Vulnerabilities, and Countermeasures to prevent Social Engineering Attacks, Conteh and Schmick (2016) explain that most soft targets for cyber-attack are as a result of various online platforms lacking the proper capacity to protect their IT infrastructure from hackers focusing on stealing personal details of users. Conteh and Schmick (2016) also attribute the increasing number of cyber-crime cases to social engineering. They depict that the attacks are aimed at making victims disclose private information. In contrast to these claims, other researchers attribute cybercrimes to the personal traits of internet users. For instance, Van de Weijer and Leukfeldt (2017) in their article The Big Five Personality Traits of Cybercrime Victims, discuss that the personal qualities of extraversion, sociability, conscientiousness, emotional stability, and openness can contribute to vulnerability to attacks. Therefore, it can be concluded that the severity of cybercrimes is due to the inability of service providers to protect their systems and also the personal traits of victims.
Looking at the works of most researchers, naivety has been identified as one of the factors that cyber attackers rely on to get their victims. In their article Individual Information Security, User Behavior and Cyber Victimization: an Empirical Study of Social Netw.
This document discusses cyberterrorism and the challenges around defining it. It provides definitions of cyberterrorism from different sources, which vary in their descriptions of the perpetrator, motive, target, and intent. Specifically, the definitions differ most in their characterizations of the perpetrator and intent. The lack of a clear, agreed-upon definition has made it difficult to establish governance and laws around cyberterrorism. Having a shared understanding of what cyberterrorism is would help address this growing threat in a more coordinated way.
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy concerns, proper handling of financial information, and Personally Identifiable Information. Currently an IT staff handles responses to these incidents in an Ad Hoc manner. A properly trained, staffed, and equipped Cyber Incident Response Team is needed to quickly respond to these incidents to minimize data loss, and provide forensic data for the purpose of notification, disciplinary action, legal action, and to remove the risk vector. This paper1 will use the proven Incident Command System model used in emergency services to show any sized agency can have an adequate CIRT.
This document discusses the need for small to medium sized hospitals to implement an incident response plan and cyber incident response team (CIRT) to properly handle security incidents. It notes that most such organizations currently lack dedicated resources to properly address cybersecurity issues. The document then outlines some of the key legal implications of health data privacy laws and proposes adapting the established Incident Command System model used in emergency response to structure a CIRT. Specific recommendations are provided regarding the necessary skills, tools, and processes a CIRT would need to effectively prepare for, identify, contain, eradicate, recover from, and follow up on security incidents.
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
The present study examined a selection of 76 ransomware splash screens collected from a variety of sources. These splash screens were analysed according to surface information, including aspects of visual appearance, the use of language, cultural icons, payment and payment types. The results from the current study showed that, whilst there was a wide variation in the construction of ransomware splash screens, there was a good degree of commonality, particularly in terms of the structure and use of key aspects of social engineering used to elicit payment from the victims. There was the emergence of a sub-set of ransomware that, in the context of this report, was termed ‘Cuckoo’ ransomware. This type of attack often purported to be from an official source requesting payment for alleged transgressions.
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiVinaOconner450
CJ513
Unit 3 DQ
Topic #1
The Definition of Cyberterrorism
Discuss the current debate surrounding the definition of cyberterrorism. Why is there no common definition? What are some of the challenges associated with establishing a common definition? Provide examples of two competing definitions of cyberterrorism from different sources and discuss the differences between the definitions. What are the implications of these differences? Be sure to properly cite and reference sources used
Topic #1: Student Response #1(Respond to Joe)
Joe Cacioppo
Good evening class,
This was an interesting topic to research and had not given much thought to the nuances in defining and making a distinction between cyberterrorism and cybercrime. I was also surprised to hear there was not a common definition of cyberterrorism. I reviewed the United States Department of Justice Federal Bureau of Investigation website and found an article written by Tafoya (2011), who defined cyberterrorism as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.”
An alternate definition according to the Center for Strategic and International Studies (CSIS) defined cyberterrorism as, ““the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Tafoya, 2011.)
In comparing the two different definitions given, the similarities include the use of technology to coerce or intimidate to produce a change. The differences in the FBI definition have a better defined group of targeted populations for change, for example political, religious or ideological change. I have not seen an implication between the differences in the two given definitions. The end result, and the methods for cyberterrorism is similar.
Additional research on cyberterrorism described the activity as any premeditated, politically motivated attack against information systems, programs and data that results in violence against noncombatant targets by subnational groups of clandestine agents, (Hanna, et. al., nd.)
References:
Hanna, H.T., Ferguson, K, Rosencrance, L. (nd.) Techtarget network. Cyberterrorism. https://searchsecurity.techtarget.com/definition/cyberterrorism
Tafoya, W.L. 2011. The United States Department of Justice. Cyber Terror. https://leb.fbi.gov/articles/featured-articles/cyber-terror
Topic #1: Student Response #2(Respond to Elizabeth)
Elizabeth Stuart
Cyberterrorism, while understood by some on a basic level, remains an elusive concept to many. There is no agreed upon definition in academia or government for this term. Due to this, it can be difficult to pinpoint what exactly constitutes cyberterrorism. In their article, Klein (2018) utilized a definition by Denning (2000), who described cyber ...
Developing counter strategy for Information warfare in Health Sector – siftin...TanveerRehman4
Developing Counter Strategy for Information Warfare in Health Sector – sifting ‘Real’ from ‘Fake’ News
The document discusses counter strategies for dealing with the spread of misinformation ("infodemic") in the health sector. It defines different types of information warfare like electronic warfare, cyberwarfare and psychological operations. It also explains the burden of health misinformation and how false beliefs can spread. Several counter strategies are proposed, including strengthening health journalism, enforcing laws against spreading fake news, improving digital health literacy, using fact-checking organizations, and building public capacity through education.
Talk on fake news as digital culture given at the Institute for Policy Research symposium on Politics, Fake News and the Post-Truth Era, University of Bath, 14 September 2017.
More about the talk here: http://lilianabounegru.org/2017/09/23/fake-news-in-digital-culture-at-2017-institute-for-policy-research-symposium/
More about the event here: http://www.bath.ac.uk/events/politics-fake-news-and-the-post-truth-era/
This document summarizes the results of two surveys on privacy perceptions related to biometric technology. The surveys were administered by Purdue University's International Center for Biometric Research in 2013 and 2014 with 304 total participants. The surveys found strong support for using biometrics for counter-terrorism and banking security. Other privacy concerns like data hacking and storage vulnerabilities did not significantly change between surveys. In general, understanding and use of biometric technology remained similar over time. Previous surveys from 2007 are also summarized and show similar privacy concerns were expressed regarding function creep and data security issues with biometric systems.
The document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It notes that all healthcare professionals must receive training on privacy regulations like HIPAA to avoid breaches. Patients trust providers with sensitive personal information, so it is imperative that privacy is protected. The document also recommends adopting stronger security systems and technology safeguards when collecting or sharing patient data online or in home healthcare settings. Overall, maintaining confidentiality is an ethical duty that requires robust training and compliance with applicable laws and regulations.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This presentation examines to what extent that cyber-insurance can be a useful tool to manage the risks and harms caused by massive cyber-attacks from the national as opposed to enterprise standpoint,
Can We Avert A Cyber-Insurance Market Crisis?Ethan S. Burger
This presentation examines to what extent that cyber-insurance can be a useful tool to manage the risks and harms caused by massive cyber-attacks from the national as opposed to enterprise standpoint --
1) The study examined how Florida State University students receive and perceive terrorism-related information on social media.
2) Surveys found that 57% of students first learned of the 2015 Paris attacks via social media, and over half see multiple news articles about terrorism on social media daily.
3) While many students feel uneasy about terrorists using social media, nearly half believe social media sites should broadcast terrorism news, but the government should not block related posts or profiles.
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
The psychological effects of cyber terrorism
Michael L. Gross , Daphna Canetti and Dana R. Vashdi
ABSTRACT
When ordinary citizens think of cyber threats, most are probably worried about their passwords
and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an
airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as
physical destruction, and our research has found that, depending on who the attackers and the
victims are, the psychological effects of cyber threats can rival those of traditional terrorism.
KEYWORDS
Cyber security; cyber
terrorism
Cyber aggression has become a daily fact of life in the
21st century, yet for most people it’s still only a reality
in the form of cyber crime – hackers targeting financial
information or other personal details. Politically moti-
vated attacks might threaten them as well, but they
tend to be the concern of governments and corpora-
tions rather than ordinary citizens. The thought of a
terrorist shooting in a mall or bombing in an airport
probably seems far more frightening to the average
person than Russian hackers disrupting government
networks in Estonia or Anonymous breaking into the
police department of Ferguson, Missouri. Cyber terror-
ists, after all, have yet to actually kill or injure anyone.
Yet our research has found this perception of cyber
aggression might not be entirely accurate. The aim of
terrorism, after all, is not just physical destruction, and
depending on who the attackers and the victims are,
the psychological effects of cyber terrorism can be just
as powerful as the real thing.
Defining cyber terrorism
People face cyber aggression on an almost daily basis.
Hackers appropriate, erase, or ransom data, defraud
bank customers, steal identities, or plant malevolent
viruses. In many cases, hackers are criminals out for
pecuniary gain. But sometimes their motives are poli-
tical. Some are “hacktivists,” or cyber activist groups,
like Anonymous, others are terror groups like Hamas
or Islamic State, and still others are agents of national
states like Iran, North Korea, or Russia. They are not
usually after money but pursue a political agenda to
foment for social change, gain political concessions, or
cripple an enemy. Sometimes their means are peaceful,
but other times they are vicious and violent. The lines
often blur. Anonymous will hack the Ferguson police
department just as it will initiate an “electronic
Holocaust” against Israel in support of the Palestinian
cause (Rogers 2014). Islamic activists will use the
Internet not only to recruit members and raise funds
for social welfare projects but also to steal money for
terrorist activities or disseminate information to stoke
fear and demoralize a civilian population. States will
pursue online espionage but also wreak havoc by crash-
ing multiple systems – as did the Russians, allegedly, in
Estonia in 2007, with mass denial-of-service attacks on
gove ...
Cyber Weapons Proliferation
Name:
Date: 03-30-2021
TOPIC: CYBER WEAPON PROLIFERATION
Currently there is no widely accepted definition on the concept of cyber weapon, but it can be described as a tool which has been modified for the purpose of carrying out malicious threats or attacks in the cyber space.
The use of Cyber space as a weapon is gradually gaining recognition, to the extent that it is currently been considered a Weapon of Mass Destruction.
In the US. For Instance, the Department of Homeland Security is tasked with the responsibility of protecting its citizens against any form of threat including cyber-attacks. The US has traditionally been perceived to be the world's most dominant cyber force in terms of this kind. Both their capabilities (defensive and offensive) have been actively developed over the last two decades, and appear to be superior to others. In order to strengthen U.S. space defense, the United States Cyber Command (US CYBER) was established in 2010 to ensure freedom of action in cyberspace for the US government and its allies, but prevent adversaries from doing the same.
The three service elements that comprise USCYBER are the Army Cybercom, the Air Force Cybercom, and the Fleet Cybercom. In August 2017 the United States Cyber Command was elevated to the status of a Unified Combatant Command. The National Defense Strategy for 2018 stated that the US government will prioritize the integration of cyber capabilities into the full spectrum of military operations.[footnoteRef:1] [1: Cristian Barbieri, Jean-Pierre Darnis & Carolina Polito
“Non-proliferation Regime for Cyber Weapons. A Tentative Study” http://www.iai.it/sites/default/files/iai1803.pdf accessed March 30th, 2021]
The proliferations in weaponisation of cyber space by terrorist groups to carry out destructive threats have necessitated the need for in depth analysis on the regulation of the use of cyber space.
In conclusion, although clearly resembling weapons, others say cyberspace might have a different potential to do great harm without actually inflicting financial or human loss, often cyber weapons may be used as less dangerous "conventional" weapons and canolays.
However, due to the fast pace of cyber-related technological developments, leadership changes, senior defense officials must be up to speed with how these technologies impact national security and defense mechanisms so they can have updated or revisions to the current laws regulating cyber usage.
Furthermore, it is suggested that in other to combat the use of cyber space as a weapon, one has to disable the source of the threat in order to neutralize the "cyber weapon" used to attack a target, thereby rendering them ineffective.
In my opinion, limited reliance on cyber space is recommended to effectively combat cyber space terrorism.
Running head: TERRORISM
TERRORISM
TER ...
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking CulturesPiotr Siuda
Organizer: International Communication Association, University of Warsaw.
Conference: 2024 International Communication Association (ICA) regional conference Human Tech Transition: Crises in Mediatized Politics, Society & Economy, Warsaw, March 13-15, 2024.
Paper: Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures.
More Related Content
Similar to After the Attack: Introduction to the Cybercrime Minitrack
Saif Al KatheeriDr. Gina Gemmel English 161 July, 15th 2019.docxjeffsrosalyn
Saif Al Katheeri
Dr. Gina Gemmel
English 161
July, 15th 2019
Literature review: Online crime
Cybercrime has increased rapidly over the years, and wrangling debates are surrounding the issue. It has become part of everyday life. Different scholars have thoroughly examined the causes, prevalence, and potential solutions to cyber-crime. One of the most challenging issues for researchers is the increased penetration of the internet, increased use of smartphones and computers in a society with very naive users of online platforms. This is expected to lead to increased cybercrime cases. With the recent trends in online crime, most scholars in this field have dedicated their research to focus on the users of online platforms, the safety of personal information, and unauthorized privacy invasion. The review of literature from Academic sources will examine the prevalence of cybercrimes focusing on the soft targets of cyber-attack, unauthorized privacy invasion, characteristics of cybercrime victim, cybercrime trends globally and network intrusion facilitated through social engineering: which basically means using manipulation as an art figure to make a person do something or reveal confidential information. While all the sources reviewed agree that cybercrimes are a severe problem, they as well differ on the various ways to solve the problem.
For instance, some authors attribute the severity of cybercrimes to the inability of internet providers to protect their websites, while others claim that the personality of cybercrime victims often make them susceptible to attacks. In their article on Cybersecurity: Risks, Vulnerabilities, and Countermeasures to prevent Social Engineering Attacks, Conteh and Schmick (2016) explain that most soft targets for cyber-attack are as a result of various online platforms lacking the proper capacity to protect their IT infrastructure from hackers focusing on stealing personal details of users. Conteh and Schmick (2016) also attribute the increasing number of cyber-crime cases to social engineering. They depict that the attacks are aimed at making victims disclose private information. In contrast to these claims, other researchers attribute cybercrimes to the personal traits of internet users. For instance, Van de Weijer and Leukfeldt (2017) in their article The Big Five Personality Traits of Cybercrime Victims, discuss that the personal qualities of extraversion, sociability, conscientiousness, emotional stability, and openness can contribute to vulnerability to attacks. Therefore, it can be concluded that the severity of cybercrimes is due to the inability of service providers to protect their systems and also the personal traits of victims.
Looking at the works of most researchers, naivety has been identified as one of the factors that cyber attackers rely on to get their victims. In their article Individual Information Security, User Behavior and Cyber Victimization: an Empirical Study of Social Netw.
This document discusses cyberterrorism and the challenges around defining it. It provides definitions of cyberterrorism from different sources, which vary in their descriptions of the perpetrator, motive, target, and intent. Specifically, the definitions differ most in their characterizations of the perpetrator and intent. The lack of a clear, agreed-upon definition has made it difficult to establish governance and laws around cyberterrorism. Having a shared understanding of what cyberterrorism is would help address this growing threat in a more coordinated way.
INCIDENT RESPONSE PLAN FOR A SMALL TO MEDIUM SIZED HOSPITALIJNSA Journal
Most small to medium health care organizations do not have the capability to address cyber incidents within the organization. Those that do are poorly trained and ill equipped. These health care organizations are subject to various laws that address privacy concerns, proper handling of financial information, and Personally Identifiable Information. Currently an IT staff handles responses to these incidents in an Ad Hoc manner. A properly trained, staffed, and equipped Cyber Incident Response Team is needed to quickly respond to these incidents to minimize data loss, and provide forensic data for the purpose of notification, disciplinary action, legal action, and to remove the risk vector. This paper1 will use the proven Incident Command System model used in emergency services to show any sized agency can have an adequate CIRT.
This document discusses the need for small to medium sized hospitals to implement an incident response plan and cyber incident response team (CIRT) to properly handle security incidents. It notes that most such organizations currently lack dedicated resources to properly address cybersecurity issues. The document then outlines some of the key legal implications of health data privacy laws and proposes adapting the established Incident Command System model used in emergency response to structure a CIRT. Specific recommendations are provided regarding the necessary skills, tools, and processes a CIRT would need to effectively prepare for, identify, contain, eradicate, recover from, and follow up on security incidents.
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
The present study examined a selection of 76 ransomware splash screens collected from a variety of sources. These splash screens were analysed according to surface information, including aspects of visual appearance, the use of language, cultural icons, payment and payment types. The results from the current study showed that, whilst there was a wide variation in the construction of ransomware splash screens, there was a good degree of commonality, particularly in terms of the structure and use of key aspects of social engineering used to elicit payment from the victims. There was the emergence of a sub-set of ransomware that, in the context of this report, was termed ‘Cuckoo’ ransomware. This type of attack often purported to be from an official source requesting payment for alleged transgressions.
CJ513Unit 3 DQTopic #1The Definition of CyberterrorismDiVinaOconner450
CJ513
Unit 3 DQ
Topic #1
The Definition of Cyberterrorism
Discuss the current debate surrounding the definition of cyberterrorism. Why is there no common definition? What are some of the challenges associated with establishing a common definition? Provide examples of two competing definitions of cyberterrorism from different sources and discuss the differences between the definitions. What are the implications of these differences? Be sure to properly cite and reference sources used
Topic #1: Student Response #1(Respond to Joe)
Joe Cacioppo
Good evening class,
This was an interesting topic to research and had not given much thought to the nuances in defining and making a distinction between cyberterrorism and cybercrime. I was also surprised to hear there was not a common definition of cyberterrorism. I reviewed the United States Department of Justice Federal Bureau of Investigation website and found an article written by Tafoya (2011), who defined cyberterrorism as “the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.”
An alternate definition according to the Center for Strategic and International Studies (CSIS) defined cyberterrorism as, ““the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” (Tafoya, 2011.)
In comparing the two different definitions given, the similarities include the use of technology to coerce or intimidate to produce a change. The differences in the FBI definition have a better defined group of targeted populations for change, for example political, religious or ideological change. I have not seen an implication between the differences in the two given definitions. The end result, and the methods for cyberterrorism is similar.
Additional research on cyberterrorism described the activity as any premeditated, politically motivated attack against information systems, programs and data that results in violence against noncombatant targets by subnational groups of clandestine agents, (Hanna, et. al., nd.)
References:
Hanna, H.T., Ferguson, K, Rosencrance, L. (nd.) Techtarget network. Cyberterrorism. https://searchsecurity.techtarget.com/definition/cyberterrorism
Tafoya, W.L. 2011. The United States Department of Justice. Cyber Terror. https://leb.fbi.gov/articles/featured-articles/cyber-terror
Topic #1: Student Response #2(Respond to Elizabeth)
Elizabeth Stuart
Cyberterrorism, while understood by some on a basic level, remains an elusive concept to many. There is no agreed upon definition in academia or government for this term. Due to this, it can be difficult to pinpoint what exactly constitutes cyberterrorism. In their article, Klein (2018) utilized a definition by Denning (2000), who described cyber ...
Developing counter strategy for Information warfare in Health Sector – siftin...TanveerRehman4
Developing Counter Strategy for Information Warfare in Health Sector – sifting ‘Real’ from ‘Fake’ News
The document discusses counter strategies for dealing with the spread of misinformation ("infodemic") in the health sector. It defines different types of information warfare like electronic warfare, cyberwarfare and psychological operations. It also explains the burden of health misinformation and how false beliefs can spread. Several counter strategies are proposed, including strengthening health journalism, enforcing laws against spreading fake news, improving digital health literacy, using fact-checking organizations, and building public capacity through education.
Talk on fake news as digital culture given at the Institute for Policy Research symposium on Politics, Fake News and the Post-Truth Era, University of Bath, 14 September 2017.
More about the talk here: http://lilianabounegru.org/2017/09/23/fake-news-in-digital-culture-at-2017-institute-for-policy-research-symposium/
More about the event here: http://www.bath.ac.uk/events/politics-fake-news-and-the-post-truth-era/
This document summarizes the results of two surveys on privacy perceptions related to biometric technology. The surveys were administered by Purdue University's International Center for Biometric Research in 2013 and 2014 with 304 total participants. The surveys found strong support for using biometrics for counter-terrorism and banking security. Other privacy concerns like data hacking and storage vulnerabilities did not significantly change between surveys. In general, understanding and use of biometric technology remained similar over time. Previous surveys from 2007 are also summarized and show similar privacy concerns were expressed regarding function creep and data security issues with biometric systems.
The document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It notes that all healthcare professionals must receive training on privacy regulations like HIPAA to avoid breaches. Patients trust providers with sensitive personal information, so it is imperative that privacy is protected. The document also recommends adopting stronger security systems and technology safeguards when collecting or sharing patient data online or in home healthcare settings. Overall, maintaining confidentiality is an ethical duty that requires robust training and compliance with applicable laws and regulations.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This document discusses the importance of maintaining patient confidentiality and complying with privacy laws. It provides several reasons why training healthcare professionals on confidentiality is crucial, including ensuring high quality patient care and appropriate professional relationships. The document also outlines the various laws and regulations, such as HIPAA, that require protecting private patient information. Finally, it stresses the need to implement strong security measures, such as the Common Security Framework, to safeguard patient data across healthcare systems and environments.
This presentation examines to what extent that cyber-insurance can be a useful tool to manage the risks and harms caused by massive cyber-attacks from the national as opposed to enterprise standpoint,
Can We Avert A Cyber-Insurance Market Crisis?Ethan S. Burger
This presentation examines to what extent that cyber-insurance can be a useful tool to manage the risks and harms caused by massive cyber-attacks from the national as opposed to enterprise standpoint --
1) The study examined how Florida State University students receive and perceive terrorism-related information on social media.
2) Surveys found that 57% of students first learned of the 2015 Paris attacks via social media, and over half see multiple news articles about terrorism on social media daily.
3) While many students feel uneasy about terrorists using social media, nearly half believe social media sites should broadcast terrorism news, but the government should not block related posts or profiles.
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
The psychological effects of cyber terrorism
Michael L. Gross , Daphna Canetti and Dana R. Vashdi
ABSTRACT
When ordinary citizens think of cyber threats, most are probably worried about their passwords
and banking details, not a terrorist attack. The thought of a shooting in a mall or a bombing at an
airport is probably more frightening than a cyber breach. Yet terrorists aim for mental as well as
physical destruction, and our research has found that, depending on who the attackers and the
victims are, the psychological effects of cyber threats can rival those of traditional terrorism.
KEYWORDS
Cyber security; cyber
terrorism
Cyber aggression has become a daily fact of life in the
21st century, yet for most people it’s still only a reality
in the form of cyber crime – hackers targeting financial
information or other personal details. Politically moti-
vated attacks might threaten them as well, but they
tend to be the concern of governments and corpora-
tions rather than ordinary citizens. The thought of a
terrorist shooting in a mall or bombing in an airport
probably seems far more frightening to the average
person than Russian hackers disrupting government
networks in Estonia or Anonymous breaking into the
police department of Ferguson, Missouri. Cyber terror-
ists, after all, have yet to actually kill or injure anyone.
Yet our research has found this perception of cyber
aggression might not be entirely accurate. The aim of
terrorism, after all, is not just physical destruction, and
depending on who the attackers and the victims are,
the psychological effects of cyber terrorism can be just
as powerful as the real thing.
Defining cyber terrorism
People face cyber aggression on an almost daily basis.
Hackers appropriate, erase, or ransom data, defraud
bank customers, steal identities, or plant malevolent
viruses. In many cases, hackers are criminals out for
pecuniary gain. But sometimes their motives are poli-
tical. Some are “hacktivists,” or cyber activist groups,
like Anonymous, others are terror groups like Hamas
or Islamic State, and still others are agents of national
states like Iran, North Korea, or Russia. They are not
usually after money but pursue a political agenda to
foment for social change, gain political concessions, or
cripple an enemy. Sometimes their means are peaceful,
but other times they are vicious and violent. The lines
often blur. Anonymous will hack the Ferguson police
department just as it will initiate an “electronic
Holocaust” against Israel in support of the Palestinian
cause (Rogers 2014). Islamic activists will use the
Internet not only to recruit members and raise funds
for social welfare projects but also to steal money for
terrorist activities or disseminate information to stoke
fear and demoralize a civilian population. States will
pursue online espionage but also wreak havoc by crash-
ing multiple systems – as did the Russians, allegedly, in
Estonia in 2007, with mass denial-of-service attacks on
gove ...
Cyber Weapons Proliferation
Name:
Date: 03-30-2021
TOPIC: CYBER WEAPON PROLIFERATION
Currently there is no widely accepted definition on the concept of cyber weapon, but it can be described as a tool which has been modified for the purpose of carrying out malicious threats or attacks in the cyber space.
The use of Cyber space as a weapon is gradually gaining recognition, to the extent that it is currently been considered a Weapon of Mass Destruction.
In the US. For Instance, the Department of Homeland Security is tasked with the responsibility of protecting its citizens against any form of threat including cyber-attacks. The US has traditionally been perceived to be the world's most dominant cyber force in terms of this kind. Both their capabilities (defensive and offensive) have been actively developed over the last two decades, and appear to be superior to others. In order to strengthen U.S. space defense, the United States Cyber Command (US CYBER) was established in 2010 to ensure freedom of action in cyberspace for the US government and its allies, but prevent adversaries from doing the same.
The three service elements that comprise USCYBER are the Army Cybercom, the Air Force Cybercom, and the Fleet Cybercom. In August 2017 the United States Cyber Command was elevated to the status of a Unified Combatant Command. The National Defense Strategy for 2018 stated that the US government will prioritize the integration of cyber capabilities into the full spectrum of military operations.[footnoteRef:1] [1: Cristian Barbieri, Jean-Pierre Darnis & Carolina Polito
“Non-proliferation Regime for Cyber Weapons. A Tentative Study” http://www.iai.it/sites/default/files/iai1803.pdf accessed March 30th, 2021]
The proliferations in weaponisation of cyber space by terrorist groups to carry out destructive threats have necessitated the need for in depth analysis on the regulation of the use of cyber space.
In conclusion, although clearly resembling weapons, others say cyberspace might have a different potential to do great harm without actually inflicting financial or human loss, often cyber weapons may be used as less dangerous "conventional" weapons and canolays.
However, due to the fast pace of cyber-related technological developments, leadership changes, senior defense officials must be up to speed with how these technologies impact national security and defense mechanisms so they can have updated or revisions to the current laws regulating cyber usage.
Furthermore, it is suggested that in other to combat the use of cyber space as a weapon, one has to disable the source of the threat in order to neutralize the "cyber weapon" used to attack a target, thereby rendering them ineffective.
In my opinion, limited reliance on cyber space is recommended to effectively combat cyber space terrorism.
Running head: TERRORISM
TERRORISM
TER ...
Similar to After the Attack: Introduction to the Cybercrime Minitrack (20)
Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking CulturesPiotr Siuda
Organizer: International Communication Association, University of Warsaw.
Conference: 2024 International Communication Association (ICA) regional conference Human Tech Transition: Crises in Mediatized Politics, Society & Economy, Warsaw, March 13-15, 2024.
Paper: Comparing Drug Trade on Tor in Finnish, Polish, and English Speaking Cultures.
Popularizing and Connecting Esports Research: Introduction to the Esports Min...Piotr Siuda
04/01/2024; event: 57th Annual Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, University of Manoa
The Next Level of Horror Entertainment: Facing Fear in Cooperative Interactiv...Piotr Siuda
04/01/2024; event: 57th Annual Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, University of Manoa
Horror entertainment continues to change, with horror games being another step in this evolution after literature and movies. The paper characterizes how the cooperative mode of Dark Pictures Anthology games influences the horror experience of players. The Anthology has been analyzed via a close reading of selected Let’s Play videos, with 42 complete playthroughs analyzed and 18 playlists sampled. The article demonstrates how scare tactics deployed by developers cause players to feel more discomfort compared to a single-player mode. The split perspective of co-op exacerbates stress, tension, and fear as these are being experienced regarding not only oneself but also the other player. Additionally, players’ meta-genre knowledge combines with cooperation, thus influencing decisions and, ultimately, the game experiences. All this means that the cooperative way of playing may be seen as yet another step in the horror entertainment evolution.
Dziesięć lat kierunku humanistyka drugiej generacji. Czas zmian i plany na pr...Piotr Siuda
01/12/2023; impreza: Festiwal Indyków + Pierwsza Niezależna Konferencja Twórców Gier; Koło Naukowe Twórców Gier Gamedec, Katedra Badania Gier i Kultury Cyfrowej, Uniwersytet Kazimierza Wielkiego w Bydgoszczy
Sztuczna inteligencja (AI), gry i edukacjaPiotr Siuda
04/12/2023; impreza: Konferencja Naukowa „Lustro Mediów IV: Od Chat botów do CX i UX”; Politechnika Gdańska, Uniwersytet Gdański, Uniwersytet Jagielloński, Pomorski Instytut Naukowy im. Profesora Brunona Synaka
Media sports and esports during the COVID-19 pandemic - project reportPiotr Siuda
20/06/2023; event: “The World of Media Transition” International Scientific Seminar; The Laboratory of Media Studies at the University of Warsaw, Faculty of Journalism, Information, and Book Studies, University of Warsaw
Darknet imaginaries: The discursive malleability of the cultural status of di...Piotr Siuda
This document discusses a research study analyzing 505 internet memes related to the darknet in order to understand how they collectively contribute to cultural conceptions of this niche technology. The researchers identified 9 themes across the memes, including depictions of the darknet vs the clear web, darknet technology and users, the shadowy nature of the darknet, unexpected aspects of the darknet, and dark humor related to the darknet. The analysis shows that internet memes present a complex, diverse, and sometimes contradictory representation of the darknet, demonstrating the discursive malleability of how cultural status is developed for niche technologies with few users.
Toward Successful Esports Team: How Does National Diversity Affect Multiplaye...Piotr Siuda
1. The study examined how national diversity of players on professional Dota 2 esports teams affects team effectiveness.
2. The researchers analyzed data from 212 teams competing in 9 International and 5 Major tournaments from 2011-2018.
3. They found that teams with players from at least three different nationalities generally had higher win ratios, indicating more effectiveness, than less diverse or mononational teams.
Microtransaction Politics in FIFA Ultimate Team: Game Fans, Twitch Streamers,...Piotr Siuda
01/12/2022; event: The World Cup Conference, MultiPlay
The video game FIFA (Electronic Arts) is an annually released title with a very profitable “FIFA Ultimate Team” (FUT) game mode played by a large community of gamers. This has led to the emergence of celebrity FUT content creators on Twitch and on YouTube, yet also tensions between these individuals, the “average” player, and the game’s developers. The chapter explores players’ attitudes to and issues with the more powerful actors within the FUT ecosystem, offering us an incisive case study of ongoing changes and tensions in the relationships between players, developers, and content creators. In study design and analysis, the qualitative directed content analysis approach was used, as the chapter extands the project conducted over three years on the official FUT forum by one of the authors. Key categories of gamers’ criticism of content creators are indicated, keeping in mind biases that could result from this deductive approach. The players see content creators on Twitch and YouTube as a source of numerous frustrations related to gameplay, as reinforcing the game’s micropayment, and even as solely self-interested profit-makers with little “true” interest in the game. This even extends to what can only be termed conspiracy theories about the relationships between EA and FUT’s most visible content creators, with players proposing numerous surreptious connectinos between the two. The chapter hence shows what happens when successful game content creators, and the “average” player, clash, and how FUT is a valuable case study of emerging power dynamics within gaming and game culture more broadly.
Cancer on TikTok–Evaluating Online Self-Disclosure Using Directed Content Ana...Piotr Siuda
03/11/2022; event: Internet Research conference (AOiR 2022), Technical University Dublin
The presented paper characterizes TikTok practices of users with cancer and uses notions of social media as positive culture (presenting oneself without undesirable traits) and online self-disclosure understood as providing intimate, private information about oneself. The research continues the work on self-disclosure of women with breast cancer using Instagram. However, this previous research revolved around posts, and thus was limited. The current study on TikTok asks the following questions: 1) are TikTok videos disclosing information in the manner the previous research on Instagram shows? 2) What are the creators’ motivations and what meanings do they give to disclosing cancer and how do the users position themselves considering the positive culture? The study uses categories from previous work and combines qualitative directed content analysis (DCA; 862 videos are analyzed) with in-depth interviews (n=8), and these go beyond DCA to a more nuanced understanding of the users’ lived experience. Similar to Instagram, TikTok is a tool for negative (e.g., fears, anxiety, pain) and positive self-disclosure (e.g., joyful life events, self-acceptance, self-affirmation) with the prevalence of positive and educational videos (e.g. prevention, debunking stereotypes and normalizing the disease). The respondents feel especially competent to educate others because of their experiences. The research undermines the traditional understanding of online self-disclosure, as for users seeking support is not that important, compared to informing and warning others. Also, the study debunks positive culture as a too-general category, as the interviewees constitute a particular niche and seem not to care how they are perceived while disclosing cancer.
Imaginaria darknetu w internetowych memachPiotr Siuda
23/09/2022; event: The 6th Congress of the Polish Communication Association; organizers: Polish Communication Association, University of Gdansk; European Solidarity Centre; venue: Faculty of Social Sciences, University of Gdansk
Sport w czasach pandemii. O powiązaniu sportu, mediów i gierPiotr Siuda
28/07/2020; impreza: Wykład online w ramach projektu „Latający Uniwersytet Każdego Wieku”; organizacja: Kujawsko-pomorskie Centrum Kultury w Bydgoszczy.
Starzenie się a nowe technologie komunikacyjnePiotr Siuda
03/06/2020; impreza: Wykład online w ramach projektu „Latający Uniwersytet Każdego Wieku”; organizacja: Kujawsko-pomorskie Centrum Kultury w Bydgoszczy.
This document discusses how the film industry has adjusted during the COVID-19 pandemic. Physical film production and cinema closures led to questions about the industry's future. Video on demand (VOD) streaming grew significantly as people subscribed to new services. The film industry is exploring changes like drive-in screenings and virtual productions to continue operating under social distancing restrictions. The pandemic has accelerated pre-existing trends of increased VOD consumption and may permanently change the film industry landscape.
22/04/2020; impreza: Wykład online w ramach projektu „Latający Uniwersytet Każdego Wieku”; organizacja: Kujawsko-pomorskie Centrum Kultury w Bydgoszczy.
Religia i internet. Kilka uwag teoretycznychPiotr Siuda
14/11/2019; impreza: XI Toruńskie Sympozjum poświęcone Religiom i Alternatywnym Ruchom Religijnym; organizacja: Wydział Teologiczny UMK w Toruniu; miejsce: Centrum Dialogu Jana Pawła II, Toruń.
HijackLoader Evolution: Interactive Process HollowingDonato Onofri
CrowdStrike researchers have identified a HijackLoader (aka IDAT Loader) sample that employs sophisticated evasion techniques to enhance the complexity of the threat. HijackLoader, an increasingly popular tool among adversaries for deploying additional payloads and tooling, continues to evolve as its developers experiment and enhance its capabilities.
In their analysis of a recent HijackLoader sample, CrowdStrike researchers discovered new techniques designed to increase the defense evasion capabilities of the loader. The malware developer used a standard process hollowing technique coupled with an additional trigger that was activated by the parent process writing to a pipe. This new approach, called "Interactive Process Hollowing", has the potential to make defense evasion stealthier.
Honeypots Unveiled: Proactive Defense Tactics for Cyber Security, Phoenix Sum...APNIC
Adli Wahid, Senior Internet Security Specialist at APNIC, delivered a presentation titled 'Honeypots Unveiled: Proactive Defense Tactics for Cyber Security' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
Securing BGP: Operational Strategies and Best Practices for Network Defenders...APNIC
Md. Zobair Khan,
Network Analyst and Technical Trainer at APNIC, presented 'Securing BGP: Operational Strategies and Best Practices for Network Defenders' at the Phoenix Summit held in Dhaka, Bangladesh from 23 to 24 May 2024.
After the Attack: Introduction to the Cybercrime Minitrack
1. AFTER THE ATTACK
Hilton Hawaiian Village Waikiki Beach Resort,
3-6 January 2024, Honolulu, Hawaii, USA
01
HICSS.HAWAII.EDU
Introductiontothe
CybercrimeMinitrack
2. The minitrack
Piotr Siuda
Kazimierz Wielki University
Tuomas J. Harviainen
Tampere University
Juho Hamari
Tampere University
Robert W. Gehl
York University
co-chairs
02
HICSS.HAWAII.EDU
4. First edition in 2023
Giddens, Petter, Bichler, Rivas, Fullilove, Cerny,
Navigating an Interdisciplinary Approach to Cybercrime
Research
Liu, Frank, Warkentin,
Drugs for Sale! An Analysis and Estimation of Drug
Products on the Cryptomarket Ecosystem
Fitzgerald, Mason, Mulhair, Glisson,
Exploiting a Contact Tracing App to Attack Neighboring
Devices
HICSS.HAWAII.EDU
04
5. Second
edition!
Acceptance Rate: 33.33 %
All accepted papers have a strong focus on how to respond
optimally when organizations and individuals are successfully
cyber-attacked.
Despite initial submissions on a range of significant topics,
the final shape of this year’s minitrack emphasizes the role of
communication in cybercrime research.
05
HICSS.HAWAII.EDU
6. This year’s papers
HICSS.HAWAII.EDU
Conceal or Communicate?
Organizational
Notifications to
Stakeholders Following
Ransomware Attacks
Paper 1 Paper 2
BP nomination
Paper 3
06
W. Alec Cram
Albert Chan
Jonathan Yuan
Dennis Joo
The Effects of Dark Triad
Traits and Perceived Law
Enforcement Competence
in Responding to
Ransomware Attacks
Understanding
Leadership Competencies
in Cyber Crisis
Management
Truong (Jack) Luu
Michael Jones
Binny Samuel
Nico Abbatemarco
Gianluca Salviotti
Chiara D'Ignazio
L.M. De Rossi
7. Enjoy!
HICSS.HAWAII.EDU
Feel invited for the third edition
07
All images generated using DALLE-2
The intro paper: https://hdl.handle.net/10125/106890
Prime co-chair email: piotr@ukw.edu.pl
X: @piotrsiuda