SlideShare a Scribd company logo
Reading and summarizing a research article:
Authors’ last names (year) conducted a study about
________________________. The participants were/the setting
was ___________________________. (New paragraph) The
findings were _____________________________. Discussion.
(Possibly a new paragraph) The authors suggested
_____________________. Discussion.
Students should fill in the blanks with their own words. To copy
directly from the article fails to show comprehension and
considered plagiarism.
To “fill in the blanks”, a student should read the journal article
and pay specific attention to:
Sentence #1- Authors’ last names (year) conducted a study
about _________________.
· Read the Abstract; this will give an overview of the study’s
(article’s) purpose.
· Read the entire article without trying to summarize it.
· Go back and read the Literature Review or Background section
of the article. Toward the end of the section, the authors should
identify gaps in the existing literature and tell the reader how
the current study will fill that gap. The authors will also state
their hypothesis (purpose) at the end of this section.
·
Section #2 - The participants were/the setting was
___________________________.
· Read the Methods section of the paper. In this section, the
authors will describe how the data was collected, who was
included in the sample, and any instruments used.
· A reader might want to consider sample size, demographic
characteristics, or any interesting protocol.
· It is not necessary to report every fact (i.e., 35% of the
participants were male, 71%)
Section #3 - The findings were
_____________________________.
· Read the Findings section of the article.
· Some statistics may be confusing. Pay attention to key words
such as “increased”, “decreased”, “improved”, and “reduced”.
· “No change” may also be considered a significant finding.
· Next, read the Discussion section. The authors will present the
findings in general terms. Section #4 - The authors suggested
_____________________.
· Read the Discussion section and look for comments that the
authors made about the intervention or program such as “Did it
work?” or “Should it be continued?”.
· Look for the author’s critique of why the study did or did not
produce results. Did anything unexpected influence the
findings?
· The author may suggest a future line of research or “next
steps” to improve the body of knowledge.
Additional Considerations:
· A literature review is a summary of what research has been
completed in a topic area; it should be summarized in your own
words.
· Read the entire article first and then go back and take notes.
Jot down notes in your own words. This increases
comprehension as well as decreases the likelihood of
plagiarism.
· The review is written in third person; no “I” or “you”.
· Not every detail or fact needs to be reported. A reader will
obtain a copy of the article if more information is needed.
· Write the literature review in the past tense; the research has
already been completed.
· The article cannot “do”, “find”, or “say” anything. The authors
are the people who conducted the study.
· The above format is a guideline. It may be necessary to change
the verbs or to expand an idea.
T h e V i s u a l E l e m e n t s o f D e s i g n
The following ten elements are intrinsic to all forms of design,
whether they refer to image-based compositions, sculptural
forms, or time-based works.
1 . P O I N T : A position, place or spot that is defined by a
specific and identifiable measurement in space. For example,
the corner of a cube can be identified specifically.
2 . L I N E : Line is a point that moves. Therefore, it functions
as a mark that connects two points. Lines can be literal, (such
as a rule line), or implied (such as a linear force). Lines can
organize, contain, separate, direct, connect, convey rhythm, or
suggest motion.
This painting by Paolo Uccello, Battle of San Romano, c. 1456,
demonstrates the use of linear forces as opposed to actual rule
lines. The viewer reads the procession and convergence of lines
as unifying elements of the composition.
3 . P L A N E : A plane is the surface containing all the
straight lines connecting any two points on it. When referring to
a
drawing, the piece of paper on which the drawing is made is a
plane, but it also contains illusory planes that
represent other objects in space. In the image (below, right), the
front face of
the table represents one plane, and the wall behind the table
represents
another plane.
4 . F O R M ( o r S H A P E ) : Form or shape is indicated by
the ending of one
item or object as it is seen next to or inside of another item or
object.
Geometric forms are good examples. We are able to designate a
black circle
floating within the center of a piece of white paper because we
can easily
define the end (or the silhouette) of the black form against the
white paper.
Similarly, when we look at this image of Charles Sheeler’s
painting,
entitled Interior, 1940 (right), we see triangles, rectangles,
ovals, the curved
form of a pitcher, etc. There are also pronounced linear
elements that help
us move throughout the composition. Note that the forms that
are seen in
this painting are not restricted to the nameable objects that
pertain to the
items in the still life painting (such as the pitcher). Some of the
forms are
created by shadows (such as the triangle under the table). This
brings us to
the next element of design…
5 . P O S I T I V E / N E G A T I V E S P A C E ( o r F I G U
R E / G R O U N D R E L A T I O N S H I P ) : This is the
relationship of what we
view as shapes against their surroundings. Referring back to
Sheeler’s painting, the pitcher, dish, table, picture on the
wall, and piece of cropped furniture to the left of the
composition are all positive shapes that refer to actual objects
in
space. The wall is negative space. However, the shadows tend to
function as both positive and negative spaces
simultaneously, since we know that they are “holes” in the air,
but they are as visually tactile (and in some cases, even
more so) than what we know to be solid objects.
2
Now, letʼs look at Richard Diebenkornʼs ink drawing from
1967, entitled Still Life with Cigarette Butts and Glasses,
(left). The sharp contrast in positive and negative shape
leads the viewerʼs eye through a repetition of similar
“holes” (such as the handles of the scissors and the
frames of the eyeglasses). The composition also
presents a sequence of rectangles, lines and circles that
create a rhythm of movement. (See The Principles of
Design on the next page.)
6 . S I Z E : This is the actual measurement of how big
something is. For instance, on a piece of paper that measures 18
x
24 inches, there may be a drawing of a figure. The shape of the
figure may measure 12 x 5 inches. This measurement has
nothing to do with the measurements of the subject in reality.
7 . S C A L E : Not to be confused with size, scale refers to
the relationship of
one thing, object, or image to another. This sculpture (left),
entitled Triune,
by Robert Engman, 1975, is situated in Philadelphia’s City
Center.
Although the sculpture is considerably smaller than City Hall
(the building
seen to the right of the sculpture in the image), the dynamic
point-of-view
of this photograph causes the sculpture to dwarf the adjacent
building.
Therefore, in this image, the Scale of the sculpture to the size of
the
pictorial field is greater than the scale of the building to the
size of the
pictorial field.
8 . T E X T U R E : Texture refers to the feel of a surface, and
can be literal or
illusory. Patterns in images convey texture, as well. A drawing
or
photograph can convey the feeling of furriness or of sharpness
even though
the physical touch of the drawing or photograph is smooth.
9 . V A L U E : The relative lightness or darkness of an object
or area is known as value. For image-based works such as
drawings and photographs, value gives illusory space (volume
and distance) to the two-dimensional surface. In addition,
value variations help the viewer determine shapes, as well as
positive and negative space within a pictorial field.
1 0 . C O L O R : Color is often included in the list of Visual
Elements of Design, as it functions simultaneously with, but
also independently, from value. But, because of its
psychological effects, and due to semiotic and cultural
applications,
color is an element that tends to be nomadic and unpredictable,
which does not adhere to the same kind of rational
analysis that the other nine elements provide. Therefore, it must
be given its own category. We will cover that in the
second half of the semester.
3
A p p l i c a t i o n s o f D e s i g n
These applications constitute the various configurations and
behaviors of the Elements of Visual Design. In some cases,
these applications are defined differently when discussing
image-based compositions, sculptural forms, or time-based
works.
A . R H Y T H M : The pattern of repeating design elements is
known as rhythm. This repetition can imply a flow that leads
the viewer through a composition or around a sculpture, and can
solidify otherwise disparate elements within an artwork,
design or installation.
In this 1920-21 linocut by
Vladimir Kozlinsky, entitled
ROST A Window Poster, the
black square that is repeated
in the windows, the opened
mouths, and the width of the
letterforms creates a sense of
unity in the composition. What
other repeated elements can
you identify that add to the
overall cohesiveness of this
diptych?
The procession of Nick Cave's
Speak Louder, 2011, reads like a
piece of sheet music, with
repeating circular shapes
positioned in varying
orientations of high and low,
and the swag of connecting
fabric acting as a ribbon to tie
the shapes together.
B . B A L A N C E : Balance (in image-based compositions)
refers to the VISUAL distribution of design elements. (Note
that
this is not the same as balance when used in relation to physical
forces involving weight and gravity in sculptural forms.)
In this regard, balance most frequently occurs across the
vertical axis of a pictorial field (vertical symmetry). Horizontal
symmetry is rare, but visually compelling. Asymmetrical
distribution of design elements can suggest dynamic movement
or
visual emphasis as seen in the sample on the following page.
4
Serbian artist Mrdjan Bajic´
evokes uneasiness with this
sculpture entitled Angel, 2007,
shown in the image on the left.
This work of art represents visual
asymmetry while it remarkably
maintains structural balance.
Kendell Geersʼ neon artwork
Seven Deadly Sins (Gluttony),
2007, seen at the far right,
illustrates both vertical and
horizontal symmetry.
C . M O V E M E N T : The placement of design elements in
relation to one another or to the format of the pictorial field
itself, not only leads the viewer’s eye from one element to
another, but can also imply motion from the elements being
depicted. The formats of compositional movement include (but
are not limited to): radial movement (both converging
and expanding); gravitational movement (both falling and
rising); and linear movement (either from one edge of the
pictorial field to another, or from the front to the back of the
pictorial field). We tend to read symbolic representations as
directors of movement, such as arrows, a pointed finger, or the
direction of the subject's gaze. Speed of movement can
also be conveyed through the value, placement and shape of the
visual elements. The two installations below imbue quite
different sensibilities of movement:
The installation above is Francis Alysʼ presentation at
the 2007 Venice Biennale. Consistently sized frames
placed in straight rows create horizontal, linear
movement and a pattern that mimics even footsteps
during a calm walk. (The drawings happen to
represent the repeated motions of shining a shoe.)
By contrast, at the right is Oyvind Fahlstromʼs
installation at the 2009 Venice Biennial. The
movement created by the placement of the
individual works in the gallery is unstructured and
erratic, with various scales and gravity-defying
suspension that moves viewers in and out of the
works like a racquetball in play.
D . P E R S P E C T I V E : Perhaps the most dynamic
application of Visual Elements of Design is perspective.
Perspective is
the translation of actual space into two-dimensional forms. The
placement of elements along converging linear forces
simulates advancing and receding planes. Likewise, the shift in
scale of objects mimics the way our vision interprets
distance. Perspective is most often associated with perceptive or
image-based works of art and design, although some
sculptors and architects have used this visual device to achieve
incredible results.
5
E . P O I N T - O F - V I E W : The application of point-of-
view is
unique to works of art that are image-based because it
represents the artist's position in relation to the subject
when creating the work. (This should not be confused
with the viewer's position when viewing the work, nor
does "point-of-view" mean "opinion.") When working
with a stationary subject, an artist working in drawing,
painting, photography or film maintains a single point-of-
view (with the exception of the Cubists). However, an
artist working sculpturally, architecturally, or with
installation must circumnavigate all spatial possibilities of
her or his subject. It then follows that viewers of a
painting, drawing, photograph or film project themselves
into the work exactly as it was viewed or conceived by the
artist. The results are compelling, such as the bird’s-eye
composition seen at right, entitled The Midnight
Ride of Paul Revere, by Grant Wood, 1931. At the
bottom of the pictorial field, where we least expect to
see them, we find the chimneys and rooftops of houses. The
road curls up to the top of the pictorial field as if it were the
smoke curling from one of these chimneys.
(Note: POINT-OF-VIEW, as it is discussed here, refers to a
characteristic of the work of art or design, and describes the
position in space (high, low, near, far) from which the artist has
depicted her or his subject.)
R E C A P :
T h e E l e m e n t s o f D e s i g n A p p l i c a t i o n
s o f D e s i g n
1 . P O I N T A . R H Y T H M
2 . L I N E B . B A L A N C E
3 . P L A N E C . M O V E M E N T
4 . F O R M D . P E R S P E C T I V E
5 . P O S I T I V E / N E G A T I V E S P A C E E . P O I
N T - O F - V I E W
6 . S I Z E
7 . S C A L E
8 . T E X T U R E
9 . V A L U E
1 0 . C O L O R
6
Formal Analysis
Spring, 2020
Due Dates:
· Submit in Class, (btw 800-1500 words): Feb 27th
· Choose one artwork from our selection
· Write a thoughtful, formal analysis paper about your choice.
This assignment’s design is to stimulate your observation skills
and encourage you to express arguments clearly and concisely.
Write a formal analysis or “analytical description” of the
artwork. Your paper should give a verbal account of what you
see in the work. Your paper should follow the “Visual Elements
of Design (according to the attached Pdf file in Canvas). In
addition, when constructing your formal analysis, you should
consider issues such as religion, function, symbolic meaning,
techniques, as well as materials, and composition. You should
think about how these aspects of the work affect your
perception of it and shape its meaning.
Your paper should have an introduction that names and describe
the work you will be discussing and that indicates the principal
points you want to make about it. Your paper should also have
well-organized paragraphs, a sense of development, and a
conclusion. You should ensure that general claims you make
about your chosen piece are backed up with specific evidence.
· This is not a research paper; therefore, research is not
permitted.
· Make sure to add image/s of the artwork
Late Policy
Late papers will be penalized 1/3 of a letter grade per day late,
include weekend. Extensions will only be granted in cases of
legitimate excuse.
Thank you;
Good luck
Dr. Chwalkowski
The Prophet Muhammad sits with the Abrahamic prophets in
Jerusalem, anonymous, Mi‘rajnama (Book of Ascension),
Tabriz, ca. 1317-1330. TOPKAPI PALACE LIBRARY
Mihrab, 1354–55, just after the Ilkhanid period, Madrasa Imami,
Isfahan, Iran, polychrome glazed tiles, 343.1 x 288.7 cm
(Metropolitan Museum of Art)
Stand (rahla) for a Qur'an Manuscript
Maker: Zain Hasan Sulaiman Isfahani
Date: dated 1360
Geography: Made in Iran
Medium: Wood (teak); carved, painted, and inlaid
Dimensions: W. (when closed) 16 1/8 in. (41 cm)
H. (when closed) 51 1/4 in. (130.2 cm)
Bowl with Courtly and Astrological Motifs
late 12th–early 13th century, Attributed to Central or Northern
Iran
Medium: Stonepaste; polychrome inglaze and overglaze painted
and gilded on opaque monochrome glaze (mina'i)
Dimensions: H. 3 3/4 in. (9.5 cm), Diam. 7 3/8 in. (18.7 cm),
Wt. 14 oz. (396.9 g)
"The Court of Gayumars", attributed to Sultan Muhammad,
circa 1522–1525, from the Tahmasp Shahnama, Tabriz
Prayer in the Mosque
Artist: Jean-Léon Gérôme (French, Vesoul 1824–1904 Paris)
Date: 1871
Medium: Oil on canvas
Dimensions: 35 x 29 1/2 in.
Akbar Inspecting the construction of Fatehpur Sikri, 1586
Artsist: Tulsi (artist, composition, maker)
Bandi (artist, colours and details, maker)
Madhav Khord (portraits, artist)
Buffaloes in Combat, Attributed to Miskin (1570–1604).
Illustrated single work. late 16th century, India. Medium: Ink,
watercolor, and gold on paper
Dimensions: 6 7/8 x 9 1/2in.
See discussions, stats, and author profiles for this publication
at: https://www.researchgate.net/publication/276461922
Information and Password Attacks on Social Networks:: An
Argument for
Cryptography
Article in Journal of Information Technology Research · July
2017
DOI: 10.4018/JITR.2015010103
CITATIONS
15
READS
997
3 authors:
Some of the authors of this publication are also working on
these related projects:
OwlBeans View project
SentimentAnalysis View project
Enrico Franchi
Università di Parma
27 PUBLICATIONS 208 CITATIONS
SEE PROFILE
Agostino Poggi
Università di Parma
194 PUBLICATIONS 4,690 CITATIONS
SEE PROFILE
Michele Tomaiuolo
Università di Parma
91 PUBLICATIONS 489 CITATIONS
SEE PROFILE
All content following this page was uploaded by Michele
Tomaiuolo on 03 August 2015.
The user has requested enhancement of the downloaded file.
https://www.researchgate.net/publication/276461922_Informatio
n_and_Password_Attacks_on_Social_Networks_An_Argument_f
or_Cryptography?enrichId=rgreq-
235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_2&_esc=publicationCoverPdf
https://www.researchgate.net/publication/276461922_Informatio
n_and_Password_Attacks_on_Social_Networks_An_Argument_f
or_Cryptography?enrichId=rgreq-
235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_3&_esc=publicationCoverPdf
https://www.researchgate.net/project/OwlBeans?enrichId=rgreq-
235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_9&_esc=publicationCoverPdf
https://www.researchgate.net/project/SentimentAnalysis?enrichI
d=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_9&_esc=publicationCoverPdf
https://www.researchgate.net/?enrichId=rgreq-
235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_1&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r
greq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_4&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r
greq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_5&_esc=publicationCoverPdf
https://www.researchgate.net/institution/Universita_di_Parma?e
nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_6&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r
greq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_7&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Agostino_Poggi?enrichId=
rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_4&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Agostino_Poggi?enrichId=
rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_5&_esc=publicationCoverPdf
https://www.researchgate.net/institution/Universita_di_Parma?e
nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_6&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Agostino_Poggi?enrichId=
rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_7&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich
Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_4&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich
Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_5&_esc=publicationCoverPdf
https://www.researchgate.net/institution/Universita_di_Parma?e
nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_6&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich
Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_7&_esc=publicationCoverPdf
https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich
Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed-
XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo
yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D
%3D&el=1_x_10&_esc=publicationCoverPdf
Information Attacks on Online Social Networks
Enrico Franchi, Agostino Poggi and Michele Tomaiuolo
Department of Information Engineering, University of Parma,
Italy
ABSTRACT
Online social networks have changed the way people interact,
allowing them to stay in touch with their
acquaintances, reconnect with old friends, and establish new
relationships with other people based on
hobbies, interests, and friendship circles. Unfortunately, the
regrettable concurrence of the users’
carefree attitude in sharing information, the often sub-par
security measures from the part of the system
operators and, eventually, the high value of the published
information make online social networks an
interesting target for crackers and scammers alike. The
information contained can be used to trigger
attacks to even more sensible targets and the ultimate goal of
sociability shared by the users allows
sophisticated forms of social engineering inside the system.
This work reviews some typical social
attacks that are conducted on social networking systems,
carrying real-world examples of such
violations and analysing in particular the weakness of password
mechanisms. It then presents some
solutions that could improve the overall security of the systems.
Keywords: social networks; information security; cryptography;
password cracking; social engineering.
INTRODUCTION
If we have to chose among the innovations of the past decade
just a single phenomenon because of its
outstanding social impact, that would be the diffusion of online
social networks. While some social
networking services were already active in the nineties, the
capillary diffusion and the sheer number of
people involved transformed online social networking in an
unprecedented revolution only recently.
Online social networks have already modified the way people
interact. They allow users to reconnect
with old friends, or to establish new connections with unknown
people. In general, users are facilitated
in maintaining and developing the relationships with their
acquaintances, on the basis of common
activities, interests, and contacts.
From a technological perspective, online social networks are
mostly based on sets of web-based
services that allow people to present themselves through a
profile, to establish connections with other
users in the system, and to publish resources. Moreover, these
systems use common interests and the
natural transitivity of some human relationships to suggest new
contacts with whom to establish a
connection. Although some of these aspects already appeared in
other systems, online social networks
represent an unprecedented cultural phenomenon. It is mainly
characterised by the unceasing flow of
information that users publish in such systems, and their
relentless strife to increase the number of their
virtual friends and acquaintances.
Unfortunately, online social networks are becoming an
interesting target for crackers and scammers
alike. In fact, many factors concur to attract malicious actions:
(i) the users’ carefree attitude in sharing
information, (ii) the often sub-par security measures from the
part of the system operators, and (iii) the
high value of the published information. In particular, the
information available through social media
can be used to trigger attacks to even more sensible targets.
Various forms of social engineering inside
the system, including sophisticated and long term attacks, may
be facilitated by the general sense of
sociability shared by users, which per se is an intrinsic
objective of social media. However, while the
only lasting solution to privacy and security issues would be
increasing the users awareness, much can
and shall be done at the system level in order to protect the data
with cryptography and to decrease the
impact of wrong choices and mistakes on the user’s part.
This work reviews some typical social attacks that are
conducted on social networking systems,
carrying real-world examples of such violations and analysing
in particular the weakness of password
mechanisms. It then presents some solutions that could improve
the overall security of the systems.
SECURITY THREATS ASSOCIATED WITH SOCIAL MEDIA
Nowadays, online social networks involve people from the
entire world, of any age and with any kind
of education. They also helped to increase computer usage
among categories that previously showed
little interest for it (Stroud, 2008). The users of information
systems have various types of security
requirements, including: confidentiality, integrity,
accountability, availability and anonymity. The same
security requirements can be applied to social networking
platforms, as well.
Unfortunately, while most users are aware that their profile and
the information they publish is
essentially public, they usually strengthen their privacy settings
only after problems arise and tend to
overlook the actual impact of the information they disclose
(Stroud, 2008). Apparently harmless
information can be exploited, and the more information the
attacker has, the more severe and
sophisticated the attack can be. For example, name, location and
age can be used to connect a profile to
a real-world identity for more than half of the residents in the
USA (Irani et al., 2011).
In fact, social networking platforms are susceptible to different
types of attacks, targeting different
components, conducted from different domains, using different
techniques. For better analysing these
attacks, it is useful to identify the main abstract components of
a generic social networking platform,
corresponding to different functional aspects of those systems.
Attackers can target each of the different
components, or they can target different levels, possibly with
roughly the same logic. We identify four
main components:
1. The social networking component. It manages and protects
access to the users' personal profiles
and the social relationships among users.
2. The content management component. It manages and protects
access to all user generated
content, including personal status updates, comments, links to
other content, photos and
multimedia galleries.
3. The infrastructure services component. It provides the basic
infrastructure services needed to
run the social networking platform, including storage and
replication services for content and
profiles, information indexing and routing, management of
users' online presence.
4. The communication and transport component. It encapsulates
basic inter-networking and ad-
hoc networking functionalities.
Moreover, we can distinguish two different kinds of attackers:
1. Intruders. An attack can be conducted by users accessing the
system without proper
authorization, or with accounts created for conducting the
attack, purposely.
2. Insiders. Also legitimate users or entities participating in the
systems operations can assume
malicious behaviours. From the users point of view, malicious
behaviour can also be attributed
to the service provider.
All the various classical kinds of security attacks may be
adapted and applied to online social networks,
too. The most typical threats against OSNs include:
• Unauthorized Access. Users who have not been granted
adequate permissions for accessing
some services and resources, may attempt to circumvent the
security mechanisms and policies
of the system and gain unauthorised access. In a social
networking platform, any user who has
access to some profiles and messages can harm their legitimate
owners. The collection of
existing data is the basis of profiling attacks. These data may
also supply some knowledge for
secondary data collection from a wide range of different
sources, including other OSNs.
Remote access can also occur at system level. In this case the
attacker may directly gain control
of all resources.
• Social engineering. In a social networking application, a
common attack is to psychologically
manipulate a user into performing misguided actions. It is
similar to a confidence trick or a
traditional fraud, but by means of computer-based
communications and online social
networking, typically to gain access to confidential information.
In a phishing scheme, the
attacker masquerades as a trustworthy entity to obtain the
desired information. In most cases the
victim and the attacker never acknowledged each other directly
in real life.
• Masquerading. When a rogue user disguises his identity and
claims the identity of another user,
the former is said to be masquerading. Masquerading may be
attempted by an attacker either
during a conversation or while registering his own profile, for
deceiving other users or the
whole social networking platform. Sometimes, masquerading is
the first step to gain access to
infrastructure services and resources to which the attacker is not
entitled. Simple impersonation,
by cloning the victim's profile from the same platform or by
porting profile data from a different
platform, may easily lead the attacker to gain trust from the
victim's contacts. This way, it can
damage other users eventually deceived. Especially in
communities where reputation is valued,
masquerading can also damage the user whose identity has been
stolen. In fact, the attacker may
pretend to be another user in order to shift the blame for any
liable action.
We will provide some examples and a discussion of these
threats in the following subsections.
However, also other traditional security attacks can be
conducted against OSNs, including:
• Denial of Service (DoS). The services and communications at
the infrastructure level can be
disrupted by common denial of service attacks. Social
networking platforms are also susceptible
to all the conventional denial of service attacks aimed at the
underlying operating system or
communication protocols. In addition to attacking the whole
infrastructure of a social
networking platform, users can also launch denial of service
attacks against specific users,
especially in a distributed platform. For example, repeatedly
sending messages or other spam
may place undue burden on the recipient users and their
systems. Malicious users can also
intentionally distribute false or useless information to prevent
other users from completing their
social activities.
• Repudiation. In general, repudiation occurs when a user, after
having performed some action,
later denies that action having happened (at least under his
responsibility). Repudiation can be
intentional or even accidental. It can also be the result of a
misunderstanding, when users have a
different view of events. In any case it can generate important
disputes. In a sense, nothing can
prevent a user from repudiating one of his actions. But a social
networking platform can
eventually help resolving disputes by providing needed
evidence, if it maintains a sufficiently
detailed log of events. For users who value their reputation, the
availability of such evidence
may constitute a valid deterrent.
• Eavesdropping. The attempt to observe the flow and possibly
the content of confidential
messages is one of the most classical security threats. Apart
from reading the content of
messages, which may require cryptanalysis, an eavesdropper
may gather useful information by
simply observing the pattern of messages and their recipients,
for example inferring the type of
services being requested. To eavesdrop on other users, an
attacker may also exploit the
infrastructure and communication services of the platform, e.g.
through unauthorized access.
• Alteration. When a user signs up a social networking service,
he starts exposing his profile and
content to the platform. An attacker may tamper with the profile
and content data published by
the victim, with all the messages he communicates to other
users and all data used on the
infrastructure services. Alteration can also be conducted by the
service operator, which provides
the facilities for online social networking and may take control
of published data. Alteration
may take the particular form of filtering, or censorship, when
applied systematically for
removing undesired content from the OSN.
• Copy and Replay. Each action in a social network may be
subject to copy and reply. In this type
of security threat, an attacker attempts to intercept some data
and clone it, for retransmitting it
later. The interceptor may successfully copy and replay a
message, a complete profile or any
other data. If those data are not associated with a signature and
a timestamp, the repeated
reception of such copies may pass unnoticed and accepted as a
legitimate action.
Types of information leaks from OSNs
According to Li, Li and Venkatasubramanian (2007), there are
two types of privacy attacks in online
social networks:
1. Identity disclosure. It occurs when the adversary is able to
determine the mapping from an
anonymous profile to a specific real-world entity (e.g. an
individual).
2. Attribute disclosure. It occurs when an adversary is able to
determine the value of a user
attribute that the user intended to stay private.
Moreover, attackers may gather data from:
1. A single social networking platform.
2. Multiple platforms, services or extension apps.
Sensible data may be obtained both through:
1. Direct access, either through an authorized service or through
some breach, and
2. Attribute inference, based on public data available about a
user's contacts, and the correlation
usually existing among attributes of linked profiles.
Either about identity or attributes, privacy in online social
networks is mostly intended as user-to-user
privacy: even when the relative settings are set correctly, so
that no other user in the system can access
information not intended for his eyes, the system itself has full
access to information. In fact, in most
online social networks, the system owners actually rely on such
information to make a profit, for
example to improve the accuracy of target advertisement.
Unfortunately, as long as they have full
access to the information – i.e., the information is available in
the system in the clear – any security
issue or naivety results in privacy violations.
Even innocuous features can be easily become serious issues.
For example, in order to promote the
service, Facebook had a public directory containing the names
of the users that used to be presented
along with 10 random friends of theirs. Such feature allowed
web-spiders to repeatedly request pages
from such directories and essentially discover the structure of
the network. Subsequently, the number of
friends was reduced to 8 and the selection of friends became a
deterministic function of the IP address
of the requester. However, even the greatly reduced information
can still be used to violate privacy
(Bonneau, 2009).
Another very relevant problem is the amount of integration we
expect from digital services. Online
social networks are relatively open system that can be enhanced
by third party widgets and games,
usually called apps, which are embedded in the user’s pages and
typically have access to some amount
of user information. Moreover, the users often want different
services to interoperate for various
reasons, so that, for example, a new tweet is also notified to the
Facebook friends or pictures stored on
Flickr are accessed by an online printing service. Eventually,
the credentials of the online social
network can be used, in many cases, to log in a different system
without needing a separate account.
The problem is that when any of these external services,
systems or apps is violated, private
information can be stolen. For example, in June 2012, although
the main Twitter servers were not
compromised, sensible data was nonetheless stolen from a third
party widget, TweetGif (Robertson,
2012).
Similarly, we expect our mobile devices to interact cleverly
with the online social networks. Service
providers create mobile applications, which, in turn, have some
degree of access to the data stored on
the mobile device. Although such applications usually do not
maliciously access user’s data for
purposes different from those stated, sometimes privacy is
neglected. For example, the iPhone
LinkedIn App used to send all the user’s calendars to central
LinkedIn servers, including phone
numbers, call details and passcodes, while only the relevant
information should have been sent (Cheng,
2012).
Even when the social networking platform does not provide data
directly, yet many supposedly private
properties may be inferred about a user. In fact, in social
networks the attributes of users who share
some kind of link are often correlated. Zheleva and Getoor
(2009) introduce different models of
attacks, to infer the hidden sensitive values on the basis of
friendship links or public group membership
data. Specifically:
• Friend-aggregate. It looks at the sensitive attribute
distribution amongst the friends of the
person under question.
• Collective classification. It aims at inferring class labels of
linked objects together, instead of
classifying each instance independently of the rest. It iteratively
uses inferred values for
connected private profiles, in addition to public ones.
• Flat-link. It deals with links by flattening the data and
considering the adjacency matrix of the
graph. Each user has a list of features, corresponding to the size
of the network. The public
profiles are used as a training set for the classifier.
• Blockmodelling. It is a stochastic model, supposing that users
form natural clusters or blocks.
Then, their interactions can be explained by the blocks they
belong to.
• Groupmate-link. In this model, groupmates are considered as
friends to whom users are
implicitly linked. It assumes that each group is a clique of
friends. Thus, it creates a friendship
link between users who belong to at least one group together,
without representing the strength
of the link. The resulting network can then be analysed using
one of the previous models.
• Group-based classification. It considers each group as a
feature in a classifier, and sensitive
attributes are inferred from the groups a user belongs to.
• Basic. It calculates the overall marginal distribution of public
data and uses it to infer sensitive
attributes of private profiles. This is the simplest model, which
can be applied also in the
absence of relationship and group information.
Phishing and impersonation attacks
Social engineering has always been a major security threat to
information systems. Two of the more
frequent kinds of social engineering attacks, i.e., pretexting and
phishing, require some background
information, but such information was not always easy to
obtain. In fact, some of the early social
engineering attacks actually involved going through company or
people's trash bins in order to find
scraps of paper containing relevant information. Nowadays,
many interesting pieces of information are
publicly available in social networking systems or accessible
only to victim's friends at best (or at
worse, from the attacker’s perspective).
Traditional phishing consisted in sending electronic
communications to a huge number of individuals
with the intent to have them disclose some relevant information,
such as passwords or credit card
numbers. Since the large scale of such attacks, even if only few
users actually trusted the
communication and disclosed information, it was nonetheless
enough to make the attack profitable.
Such communications typically used very generic ways to
address the victim and typically avoided any
specific detail so that the same message could be sent to all the
recipients. Nowadays, people have been
instructed not to trust such generic messages, and other forms of
phishing were created.
Spear phishing is a form of phishing where the attack is directed
against a single individual and the
offending communication contains large amounts of information
on the victim himself, in order to
convince him of the communication authenticity. This strategy
is very effective both if the information
employed is public but the victim somewhat thinks it is not or if
the attackers gained access to private
information by other means. Another popular form of phishing
is cloning: a cloning attack requires an
original legitimate message that is subsequently tampered and
sent the victims. These communications
look extremely authentic, but nonetheless they contain ways to
direct the victims towards the attackers
website (where he is usually requested his credentials). Data-
leaks offer an even more dangerous
variant: when the data leak becomes public, users expect their
service providers to send them emails
notifying them to change their password. If such mails are
instead well-crafted phishing emails, that
perhaps also use some private information about the user, many
more people fall for the scam. The kind
of attack just described actually happened in the days
immediately after the LinkedIn breach.
A serious weakness in many online services regards the
“security questions”. In fact, while phishing
can be avoided by paying attention to the actual identity of the
communications initiators, not much can
be done against “security questions” attacks. Some services
allow the users to choose the security
questions so that the information required to answer it correctly
is not publicly available, however, for
many other sites only a closed list of security questions is
available. Researchers estimated that more
than 33% of the security questions involve names of relatives or
friends and about 16% involve
personal preferences (“favorite something”). Popular security
questions are also the name of a pet
(typically the current or first one), ZIP code or social security
number (Rabkin, 2008). The victim in
online social networks often directly or indirectly divulges such
pieces of information. Even apparently
safer information, such as social security numbers, may be
guessed with high confidence from publicly
available data (Acquisti & Gross, 2009).
This kind of attacks is usually not directed towards online
social networks, at least initially, but usually
targets email service providers, because, when the security
question is answered correctly, most
systems send a password-reset email, and, consequently,
controlling the main email account is
necessarily the first step. Similarly to spear phishing, security-
question related attacks target only
specific individuals. Popular examples are the violation of
Sarah Palin's email account in 2008, using
information publicly available on Wikipedia and on official
websites and, more recently, the attack
against Mat Honan. In the latter case, the tech journalist had his
mail, iCloud and Twitter accounts
compromised after an elaborate chain of social attacks, during
which also his mobile phone, tablet and
laptop have been remotely wiped (Honan, 2012).
Another typical attack on social networking systems is
impersonation (identity theft), which can occur
either on a site where the victim already has a profile (profile
cloning) or on different site (cross-site
profile cloning). In both cases, it is easy to convince the
victim’s acquaintances to accept friendship
from the fake profile and subsequently to disclose confidential
data. Experiments on the effectiveness
of impersonation have been conducted and the results show that
such attacks mostly succeed (over 50%
success rate) even in the case of simple non-cross-profile
cloning (Bilge et al., 2009).
When the attackers obtain credential for an online social
network profile, additional attacks can be
performed. If the attackers are interested in keeping a private
database containing the violated accounts
data, they can create a widget that copies the relevant resources
or simply scrapes the web pages.
Moreover, they can try to use the same credential to attack the
user’s accounts in other online services.
Since users do not often use different passwords for different
accounts, this strategy …

More Related Content

Similar to Reading and summarizing a research article Authors’ last name.docx

Art Appreciation
Art AppreciationArt Appreciation
Art Appreciation
Andrew Molina
 
Art words for images
Art words for imagesArt words for images
Art words for images
annamartinezbiddulph
 
Form, Line, Plane, Space, Texture & Color
Form, Line, Plane, Space, Texture & ColorForm, Line, Plane, Space, Texture & Color
Form, Line, Plane, Space, Texture & Color
tanyalangford
 
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docxFORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
budbarber38650
 
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docx
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docxWriting Assignment 1 Formal Analysis PaperFor this assignment, .docx
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docx
odiliagilby
 
Vd for the web jp ln 2 2
Vd for the web jp ln 2 2Vd for the web jp ln 2 2
Vd for the web jp ln 2 2artbeyondsight
 
Perspective PowerPoint-Secondary Education
Perspective PowerPoint-Secondary EducationPerspective PowerPoint-Secondary Education
Perspective PowerPoint-Secondary EducationAnne
 
Assignment InstructionsGoals and ObjectivesTo examine the gra.docx
Assignment InstructionsGoals and ObjectivesTo examine the gra.docxAssignment InstructionsGoals and ObjectivesTo examine the gra.docx
Assignment InstructionsGoals and ObjectivesTo examine the gra.docx
rock73
 
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docxScanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
kenjordan97598
 
Elements of art
Elements of artElements of art
Elements of artbarleycat
 
Chapter Four – Enclosed is your assignment on Culture 1- What i.docx
Chapter Four – Enclosed is your assignment on Culture 1- What i.docxChapter Four – Enclosed is your assignment on Culture 1- What i.docx
Chapter Four – Enclosed is your assignment on Culture 1- What i.docx
christinemaritza
 
3 d chapter 3 3d design elements
3 d chapter 3 3d design elements3 d chapter 3 3d design elements
3 d chapter 3 3d design elements
Tracie King
 
Week 1 Elements and Principels of Design
Week 1 Elements and Principels of DesignWeek 1 Elements and Principels of Design
Week 1 Elements and Principels of Design
Adam Crump
 
Yr 7 introduction var terminology presentation
Yr 7 introduction var terminology presentationYr 7 introduction var terminology presentation
Yr 7 introduction var terminology presentationMelanie Crawford
 
DOC026 (2)DOC026DOC0
DOC026 (2)DOC026DOC0DOC026 (2)DOC026DOC0
DOC026 (2)DOC026DOC0
DustiBuckner14
 
rowse the paintings and pictorial art illustrated in The Art of Be.docx
rowse the paintings and pictorial art illustrated in The Art of Be.docxrowse the paintings and pictorial art illustrated in The Art of Be.docx
rowse the paintings and pictorial art illustrated in The Art of Be.docx
fathwaitewalter
 
Principles of Design - nf
Principles of Design - nfPrinciples of Design - nf
Principles of Design - nf
mindartpower
 
Principles of Design for the Artist
Principles of Design for the Artist Principles of Design for the Artist
Principles of Design for the Artist
Bruce Black Art
 

Similar to Reading and summarizing a research article Authors’ last name.docx (20)

Art Appreciation
Art AppreciationArt Appreciation
Art Appreciation
 
Art words for images
Art words for imagesArt words for images
Art words for images
 
Form, Line, Plane, Space, Texture & Color
Form, Line, Plane, Space, Texture & ColorForm, Line, Plane, Space, Texture & Color
Form, Line, Plane, Space, Texture & Color
 
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docxFORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
FORMAL ANALYSIS ASSIGNMENTWhat is formal analysis Formal anal.docx
 
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docx
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docxWriting Assignment 1 Formal Analysis PaperFor this assignment, .docx
Writing Assignment 1 Formal Analysis PaperFor this assignment, .docx
 
Vd for the web jp ln 2 2
Vd for the web jp ln 2 2Vd for the web jp ln 2 2
Vd for the web jp ln 2 2
 
Composition
CompositionComposition
Composition
 
Composition
CompositionComposition
Composition
 
Perspective PowerPoint-Secondary Education
Perspective PowerPoint-Secondary EducationPerspective PowerPoint-Secondary Education
Perspective PowerPoint-Secondary Education
 
Assignment InstructionsGoals and ObjectivesTo examine the gra.docx
Assignment InstructionsGoals and ObjectivesTo examine the gra.docxAssignment InstructionsGoals and ObjectivesTo examine the gra.docx
Assignment InstructionsGoals and ObjectivesTo examine the gra.docx
 
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docxScanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
Scanned by CamScannerFORMAL ANALYSIS ASSIGNMENTWhat .docx
 
Elements of art
Elements of artElements of art
Elements of art
 
Chapter Four – Enclosed is your assignment on Culture 1- What i.docx
Chapter Four – Enclosed is your assignment on Culture 1- What i.docxChapter Four – Enclosed is your assignment on Culture 1- What i.docx
Chapter Four – Enclosed is your assignment on Culture 1- What i.docx
 
3 d chapter 3 3d design elements
3 d chapter 3 3d design elements3 d chapter 3 3d design elements
3 d chapter 3 3d design elements
 
Week 1 Elements and Principels of Design
Week 1 Elements and Principels of DesignWeek 1 Elements and Principels of Design
Week 1 Elements and Principels of Design
 
Yr 7 introduction var terminology presentation
Yr 7 introduction var terminology presentationYr 7 introduction var terminology presentation
Yr 7 introduction var terminology presentation
 
DOC026 (2)DOC026DOC0
DOC026 (2)DOC026DOC0DOC026 (2)DOC026DOC0
DOC026 (2)DOC026DOC0
 
rowse the paintings and pictorial art illustrated in The Art of Be.docx
rowse the paintings and pictorial art illustrated in The Art of Be.docxrowse the paintings and pictorial art illustrated in The Art of Be.docx
rowse the paintings and pictorial art illustrated in The Art of Be.docx
 
Principles of Design - nf
Principles of Design - nfPrinciples of Design - nf
Principles of Design - nf
 
Principles of Design for the Artist
Principles of Design for the Artist Principles of Design for the Artist
Principles of Design for the Artist
 

More from sedgar5

Readreview the following resources for this activity· Poll.docx
Readreview the following resources for this activity· Poll.docxReadreview the following resources for this activity· Poll.docx
Readreview the following resources for this activity· Poll.docx
sedgar5
 
Read a selection of your colleagues’ postings.Respond to two of .docx
Read a selection of your colleagues’ postings.Respond to two of .docxRead a selection of your colleagues’ postings.Respond to two of .docx
Read a selection of your colleagues’ postings.Respond to two of .docx
sedgar5
 
Read a selection of your colleagues’ postings.Respond to at leas.docx
Read a selection of your colleagues’ postings.Respond to at leas.docxRead a selection of your colleagues’ postings.Respond to at leas.docx
Read a selection of your colleagues’ postings.Respond to at leas.docx
sedgar5
 
Read a selection of your colleagues’ postings. Make sure to find p.docx
Read a selection of your colleagues’ postings. Make sure to find p.docxRead a selection of your colleagues’ postings. Make sure to find p.docx
Read a selection of your colleagues’ postings. Make sure to find p.docx
sedgar5
 
Readregister 1Readregister 2WriteregisterWri.docx
Readregister 1Readregister 2WriteregisterWri.docxReadregister 1Readregister 2WriteregisterWri.docx
Readregister 1Readregister 2WriteregisterWri.docx
sedgar5
 
Read  Chapter two Written in the Rocks” in Why Evolution is True .docx
Read  Chapter two Written in the Rocks” in Why Evolution is True .docxRead  Chapter two Written in the Rocks” in Why Evolution is True .docx
Read  Chapter two Written in the Rocks” in Why Evolution is True .docx
sedgar5
 
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docxReady to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
sedgar5
 
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docxReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
sedgar5
 
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docxReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
sedgar5
 
ReadRethinking the Social Responsibility of Business  A Reason t.docx
ReadRethinking the Social Responsibility of Business  A Reason t.docxReadRethinking the Social Responsibility of Business  A Reason t.docx
ReadRethinking the Social Responsibility of Business  A Reason t.docx
sedgar5
 
ReadingsUse The American Community College  attached below t.docx
ReadingsUse The American Community College  attached below t.docxReadingsUse The American Community College  attached below t.docx
ReadingsUse The American Community College  attached below t.docx
sedgar5
 
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docxReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
sedgar5
 
reading Phillips & Soltis Chapter 6Wenger A Social .docx
reading Phillips & Soltis Chapter 6Wenger A Social .docxreading Phillips & Soltis Chapter 6Wenger A Social .docx
reading Phillips & Soltis Chapter 6Wenger A Social .docx
sedgar5
 
Readings Maggie Nelson, Great to Watch”Martha Stout, .docx
Readings Maggie Nelson, Great to Watch”Martha Stout, .docxReadings Maggie Nelson, Great to Watch”Martha Stout, .docx
Readings Maggie Nelson, Great to Watch”Martha Stout, .docx
sedgar5
 
Readings1.pngReadings2.pngReadings3.pngReadings4.docx
Readings1.pngReadings2.pngReadings3.pngReadings4.docxReadings1.pngReadings2.pngReadings3.pngReadings4.docx
Readings1.pngReadings2.pngReadings3.pngReadings4.docx
sedgar5
 
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docxReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
sedgar5
 
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docxReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
sedgar5
 
ReadingsRead Chapter 10 in the text Human resource management..docx
ReadingsRead Chapter 10 in the text Human resource management..docxReadingsRead Chapter 10 in the text Human resource management..docx
ReadingsRead Chapter 10 in the text Human resource management..docx
sedgar5
 
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docxREADINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
sedgar5
 
READINGSIntroductionUnit II examines ethical, legal, and .docx
READINGSIntroductionUnit II examines ethical, legal, and .docxREADINGSIntroductionUnit II examines ethical, legal, and .docx
READINGSIntroductionUnit II examines ethical, legal, and .docx
sedgar5
 

More from sedgar5 (20)

Readreview the following resources for this activity· Poll.docx
Readreview the following resources for this activity· Poll.docxReadreview the following resources for this activity· Poll.docx
Readreview the following resources for this activity· Poll.docx
 
Read a selection of your colleagues’ postings.Respond to two of .docx
Read a selection of your colleagues’ postings.Respond to two of .docxRead a selection of your colleagues’ postings.Respond to two of .docx
Read a selection of your colleagues’ postings.Respond to two of .docx
 
Read a selection of your colleagues’ postings.Respond to at leas.docx
Read a selection of your colleagues’ postings.Respond to at leas.docxRead a selection of your colleagues’ postings.Respond to at leas.docx
Read a selection of your colleagues’ postings.Respond to at leas.docx
 
Read a selection of your colleagues’ postings. Make sure to find p.docx
Read a selection of your colleagues’ postings. Make sure to find p.docxRead a selection of your colleagues’ postings. Make sure to find p.docx
Read a selection of your colleagues’ postings. Make sure to find p.docx
 
Readregister 1Readregister 2WriteregisterWri.docx
Readregister 1Readregister 2WriteregisterWri.docxReadregister 1Readregister 2WriteregisterWri.docx
Readregister 1Readregister 2WriteregisterWri.docx
 
Read  Chapter two Written in the Rocks” in Why Evolution is True .docx
Read  Chapter two Written in the Rocks” in Why Evolution is True .docxRead  Chapter two Written in the Rocks” in Why Evolution is True .docx
Read  Chapter two Written in the Rocks” in Why Evolution is True .docx
 
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docxReady to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
Ready to Pay 70$ for one below AssignmentTime Duration - 4 Hours.docx
 
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docxReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
ReadSilvia, P. (2017). Knowledge emotions feelings that fost.docx
 
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docxReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
ReadSimonton, D. K. (2017).  Creativity. In R. Biswas-Diene.docx
 
ReadRethinking the Social Responsibility of Business  A Reason t.docx
ReadRethinking the Social Responsibility of Business  A Reason t.docxReadRethinking the Social Responsibility of Business  A Reason t.docx
ReadRethinking the Social Responsibility of Business  A Reason t.docx
 
ReadingsUse The American Community College  attached below t.docx
ReadingsUse The American Community College  attached below t.docxReadingsUse The American Community College  attached below t.docx
ReadingsUse The American Community College  attached below t.docx
 
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docxReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
ReadMeData DescriptionIDCustomer IDAgeCustomers age in yearsExpe.docx
 
reading Phillips & Soltis Chapter 6Wenger A Social .docx
reading Phillips & Soltis Chapter 6Wenger A Social .docxreading Phillips & Soltis Chapter 6Wenger A Social .docx
reading Phillips & Soltis Chapter 6Wenger A Social .docx
 
Readings Maggie Nelson, Great to Watch”Martha Stout, .docx
Readings Maggie Nelson, Great to Watch”Martha Stout, .docxReadings Maggie Nelson, Great to Watch”Martha Stout, .docx
Readings Maggie Nelson, Great to Watch”Martha Stout, .docx
 
Readings1.pngReadings2.pngReadings3.pngReadings4.docx
Readings1.pngReadings2.pngReadings3.pngReadings4.docxReadings1.pngReadings2.pngReadings3.pngReadings4.docx
Readings1.pngReadings2.pngReadings3.pngReadings4.docx
 
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docxReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
ReadingsRead Jason Mittell, Narrative Complexity in Contemporar.docx
 
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docxReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
ReadingsRead pp. 207-221 of Ch. 10 of Positive Psychology.Ch.docx
 
ReadingsRead Chapter 10 in the text Human resource management..docx
ReadingsRead Chapter 10 in the text Human resource management..docxReadingsRead Chapter 10 in the text Human resource management..docx
ReadingsRead Chapter 10 in the text Human resource management..docx
 
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docxREADINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
READINGSINCLASSICALCHINESEPHILOSOPHY2RE.docx
 
READINGSIntroductionUnit II examines ethical, legal, and .docx
READINGSIntroductionUnit II examines ethical, legal, and .docxREADINGSIntroductionUnit II examines ethical, legal, and .docx
READINGSIntroductionUnit II examines ethical, legal, and .docx
 

Recently uploaded

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 

Recently uploaded (20)

Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 

Reading and summarizing a research article Authors’ last name.docx

  • 1. Reading and summarizing a research article: Authors’ last names (year) conducted a study about ________________________. The participants were/the setting was ___________________________. (New paragraph) The findings were _____________________________. Discussion. (Possibly a new paragraph) The authors suggested _____________________. Discussion. Students should fill in the blanks with their own words. To copy directly from the article fails to show comprehension and considered plagiarism. To “fill in the blanks”, a student should read the journal article and pay specific attention to: Sentence #1- Authors’ last names (year) conducted a study about _________________. · Read the Abstract; this will give an overview of the study’s (article’s) purpose. · Read the entire article without trying to summarize it. · Go back and read the Literature Review or Background section of the article. Toward the end of the section, the authors should identify gaps in the existing literature and tell the reader how the current study will fill that gap. The authors will also state their hypothesis (purpose) at the end of this section. · Section #2 - The participants were/the setting was ___________________________. · Read the Methods section of the paper. In this section, the authors will describe how the data was collected, who was included in the sample, and any instruments used. · A reader might want to consider sample size, demographic characteristics, or any interesting protocol. · It is not necessary to report every fact (i.e., 35% of the
  • 2. participants were male, 71%) Section #3 - The findings were _____________________________. · Read the Findings section of the article. · Some statistics may be confusing. Pay attention to key words such as “increased”, “decreased”, “improved”, and “reduced”. · “No change” may also be considered a significant finding. · Next, read the Discussion section. The authors will present the findings in general terms. Section #4 - The authors suggested _____________________. · Read the Discussion section and look for comments that the authors made about the intervention or program such as “Did it work?” or “Should it be continued?”. · Look for the author’s critique of why the study did or did not produce results. Did anything unexpected influence the findings? · The author may suggest a future line of research or “next steps” to improve the body of knowledge. Additional Considerations: · A literature review is a summary of what research has been completed in a topic area; it should be summarized in your own words. · Read the entire article first and then go back and take notes. Jot down notes in your own words. This increases comprehension as well as decreases the likelihood of plagiarism. · The review is written in third person; no “I” or “you”. · Not every detail or fact needs to be reported. A reader will obtain a copy of the article if more information is needed. · Write the literature review in the past tense; the research has already been completed. · The article cannot “do”, “find”, or “say” anything. The authors are the people who conducted the study. · The above format is a guideline. It may be necessary to change
  • 3. the verbs or to expand an idea. T h e V i s u a l E l e m e n t s o f D e s i g n The following ten elements are intrinsic to all forms of design, whether they refer to image-based compositions, sculptural forms, or time-based works. 1 . P O I N T : A position, place or spot that is defined by a specific and identifiable measurement in space. For example, the corner of a cube can be identified specifically. 2 . L I N E : Line is a point that moves. Therefore, it functions as a mark that connects two points. Lines can be literal, (such as a rule line), or implied (such as a linear force). Lines can organize, contain, separate, direct, connect, convey rhythm, or suggest motion. This painting by Paolo Uccello, Battle of San Romano, c. 1456, demonstrates the use of linear forces as opposed to actual rule lines. The viewer reads the procession and convergence of lines as unifying elements of the composition. 3 . P L A N E : A plane is the surface containing all the straight lines connecting any two points on it. When referring to a drawing, the piece of paper on which the drawing is made is a plane, but it also contains illusory planes that represent other objects in space. In the image (below, right), the front face of the table represents one plane, and the wall behind the table
  • 4. represents another plane. 4 . F O R M ( o r S H A P E ) : Form or shape is indicated by the ending of one item or object as it is seen next to or inside of another item or object. Geometric forms are good examples. We are able to designate a black circle floating within the center of a piece of white paper because we can easily define the end (or the silhouette) of the black form against the white paper. Similarly, when we look at this image of Charles Sheeler’s painting, entitled Interior, 1940 (right), we see triangles, rectangles, ovals, the curved form of a pitcher, etc. There are also pronounced linear elements that help us move throughout the composition. Note that the forms that are seen in this painting are not restricted to the nameable objects that pertain to the items in the still life painting (such as the pitcher). Some of the forms are created by shadows (such as the triangle under the table). This brings us to the next element of design… 5 . P O S I T I V E / N E G A T I V E S P A C E ( o r F I G U R E / G R O U N D R E L A T I O N S H I P ) : This is the relationship of what we
  • 5. view as shapes against their surroundings. Referring back to Sheeler’s painting, the pitcher, dish, table, picture on the wall, and piece of cropped furniture to the left of the composition are all positive shapes that refer to actual objects in space. The wall is negative space. However, the shadows tend to function as both positive and negative spaces simultaneously, since we know that they are “holes” in the air, but they are as visually tactile (and in some cases, even more so) than what we know to be solid objects. 2 Now, letʼs look at Richard Diebenkornʼs ink drawing from 1967, entitled Still Life with Cigarette Butts and Glasses, (left). The sharp contrast in positive and negative shape leads the viewerʼs eye through a repetition of similar “holes” (such as the handles of the scissors and the frames of the eyeglasses). The composition also presents a sequence of rectangles, lines and circles that create a rhythm of movement. (See The Principles of Design on the next page.) 6 . S I Z E : This is the actual measurement of how big something is. For instance, on a piece of paper that measures 18 x 24 inches, there may be a drawing of a figure. The shape of the figure may measure 12 x 5 inches. This measurement has
  • 6. nothing to do with the measurements of the subject in reality. 7 . S C A L E : Not to be confused with size, scale refers to the relationship of one thing, object, or image to another. This sculpture (left), entitled Triune, by Robert Engman, 1975, is situated in Philadelphia’s City Center. Although the sculpture is considerably smaller than City Hall (the building seen to the right of the sculpture in the image), the dynamic point-of-view of this photograph causes the sculpture to dwarf the adjacent building. Therefore, in this image, the Scale of the sculpture to the size of the pictorial field is greater than the scale of the building to the size of the pictorial field. 8 . T E X T U R E : Texture refers to the feel of a surface, and can be literal or illusory. Patterns in images convey texture, as well. A drawing or photograph can convey the feeling of furriness or of sharpness even though the physical touch of the drawing or photograph is smooth. 9 . V A L U E : The relative lightness or darkness of an object or area is known as value. For image-based works such as drawings and photographs, value gives illusory space (volume and distance) to the two-dimensional surface. In addition, value variations help the viewer determine shapes, as well as positive and negative space within a pictorial field.
  • 7. 1 0 . C O L O R : Color is often included in the list of Visual Elements of Design, as it functions simultaneously with, but also independently, from value. But, because of its psychological effects, and due to semiotic and cultural applications, color is an element that tends to be nomadic and unpredictable, which does not adhere to the same kind of rational analysis that the other nine elements provide. Therefore, it must be given its own category. We will cover that in the second half of the semester. 3 A p p l i c a t i o n s o f D e s i g n These applications constitute the various configurations and behaviors of the Elements of Visual Design. In some cases, these applications are defined differently when discussing image-based compositions, sculptural forms, or time-based works. A . R H Y T H M : The pattern of repeating design elements is known as rhythm. This repetition can imply a flow that leads the viewer through a composition or around a sculpture, and can solidify otherwise disparate elements within an artwork, design or installation. In this 1920-21 linocut by Vladimir Kozlinsky, entitled ROST A Window Poster, the black square that is repeated in the windows, the opened mouths, and the width of the
  • 8. letterforms creates a sense of unity in the composition. What other repeated elements can you identify that add to the overall cohesiveness of this diptych? The procession of Nick Cave's Speak Louder, 2011, reads like a piece of sheet music, with repeating circular shapes positioned in varying orientations of high and low, and the swag of connecting fabric acting as a ribbon to tie the shapes together. B . B A L A N C E : Balance (in image-based compositions) refers to the VISUAL distribution of design elements. (Note that this is not the same as balance when used in relation to physical forces involving weight and gravity in sculptural forms.)
  • 9. In this regard, balance most frequently occurs across the vertical axis of a pictorial field (vertical symmetry). Horizontal symmetry is rare, but visually compelling. Asymmetrical distribution of design elements can suggest dynamic movement or visual emphasis as seen in the sample on the following page. 4 Serbian artist Mrdjan Bajic´ evokes uneasiness with this sculpture entitled Angel, 2007, shown in the image on the left. This work of art represents visual asymmetry while it remarkably maintains structural balance. Kendell Geersʼ neon artwork Seven Deadly Sins (Gluttony), 2007, seen at the far right, illustrates both vertical and horizontal symmetry. C . M O V E M E N T : The placement of design elements in relation to one another or to the format of the pictorial field itself, not only leads the viewer’s eye from one element to another, but can also imply motion from the elements being depicted. The formats of compositional movement include (but are not limited to): radial movement (both converging
  • 10. and expanding); gravitational movement (both falling and rising); and linear movement (either from one edge of the pictorial field to another, or from the front to the back of the pictorial field). We tend to read symbolic representations as directors of movement, such as arrows, a pointed finger, or the direction of the subject's gaze. Speed of movement can also be conveyed through the value, placement and shape of the visual elements. The two installations below imbue quite different sensibilities of movement: The installation above is Francis Alysʼ presentation at the 2007 Venice Biennale. Consistently sized frames placed in straight rows create horizontal, linear movement and a pattern that mimics even footsteps during a calm walk. (The drawings happen to represent the repeated motions of shining a shoe.) By contrast, at the right is Oyvind Fahlstromʼs installation at the 2009 Venice Biennial. The movement created by the placement of the individual works in the gallery is unstructured and erratic, with various scales and gravity-defying suspension that moves viewers in and out of the works like a racquetball in play. D . P E R S P E C T I V E : Perhaps the most dynamic application of Visual Elements of Design is perspective. Perspective is the translation of actual space into two-dimensional forms. The placement of elements along converging linear forces simulates advancing and receding planes. Likewise, the shift in scale of objects mimics the way our vision interprets distance. Perspective is most often associated with perceptive or
  • 11. image-based works of art and design, although some sculptors and architects have used this visual device to achieve incredible results. 5 E . P O I N T - O F - V I E W : The application of point-of- view is unique to works of art that are image-based because it represents the artist's position in relation to the subject when creating the work. (This should not be confused with the viewer's position when viewing the work, nor does "point-of-view" mean "opinion.") When working with a stationary subject, an artist working in drawing, painting, photography or film maintains a single point-of- view (with the exception of the Cubists). However, an artist working sculpturally, architecturally, or with installation must circumnavigate all spatial possibilities of her or his subject. It then follows that viewers of a painting, drawing, photograph or film project themselves into the work exactly as it was viewed or conceived by the artist. The results are compelling, such as the bird’s-eye composition seen at right, entitled The Midnight Ride of Paul Revere, by Grant Wood, 1931. At the bottom of the pictorial field, where we least expect to see them, we find the chimneys and rooftops of houses. The road curls up to the top of the pictorial field as if it were the smoke curling from one of these chimneys. (Note: POINT-OF-VIEW, as it is discussed here, refers to a
  • 12. characteristic of the work of art or design, and describes the position in space (high, low, near, far) from which the artist has depicted her or his subject.) R E C A P : T h e E l e m e n t s o f D e s i g n A p p l i c a t i o n s o f D e s i g n 1 . P O I N T A . R H Y T H M 2 . L I N E B . B A L A N C E 3 . P L A N E C . M O V E M E N T 4 . F O R M D . P E R S P E C T I V E 5 . P O S I T I V E / N E G A T I V E S P A C E E . P O I N T - O F - V I E W 6 . S I Z E 7 . S C A L E 8 . T E X T U R E 9 . V A L U E 1 0 . C O L O R 6
  • 13. Formal Analysis Spring, 2020 Due Dates: · Submit in Class, (btw 800-1500 words): Feb 27th · Choose one artwork from our selection · Write a thoughtful, formal analysis paper about your choice. This assignment’s design is to stimulate your observation skills and encourage you to express arguments clearly and concisely. Write a formal analysis or “analytical description” of the artwork. Your paper should give a verbal account of what you see in the work. Your paper should follow the “Visual Elements of Design (according to the attached Pdf file in Canvas). In addition, when constructing your formal analysis, you should consider issues such as religion, function, symbolic meaning, techniques, as well as materials, and composition. You should think about how these aspects of the work affect your perception of it and shape its meaning. Your paper should have an introduction that names and describe the work you will be discussing and that indicates the principal points you want to make about it. Your paper should also have well-organized paragraphs, a sense of development, and a conclusion. You should ensure that general claims you make about your chosen piece are backed up with specific evidence. · This is not a research paper; therefore, research is not permitted. · Make sure to add image/s of the artwork Late Policy
  • 14. Late papers will be penalized 1/3 of a letter grade per day late, include weekend. Extensions will only be granted in cases of legitimate excuse. Thank you; Good luck Dr. Chwalkowski The Prophet Muhammad sits with the Abrahamic prophets in Jerusalem, anonymous, Mi‘rajnama (Book of Ascension), Tabriz, ca. 1317-1330. TOPKAPI PALACE LIBRARY Mihrab, 1354–55, just after the Ilkhanid period, Madrasa Imami, Isfahan, Iran, polychrome glazed tiles, 343.1 x 288.7 cm (Metropolitan Museum of Art) Stand (rahla) for a Qur'an Manuscript Maker: Zain Hasan Sulaiman Isfahani Date: dated 1360 Geography: Made in Iran Medium: Wood (teak); carved, painted, and inlaid Dimensions: W. (when closed) 16 1/8 in. (41 cm) H. (when closed) 51 1/4 in. (130.2 cm) Bowl with Courtly and Astrological Motifs late 12th–early 13th century, Attributed to Central or Northern Iran Medium: Stonepaste; polychrome inglaze and overglaze painted
  • 15. and gilded on opaque monochrome glaze (mina'i) Dimensions: H. 3 3/4 in. (9.5 cm), Diam. 7 3/8 in. (18.7 cm), Wt. 14 oz. (396.9 g) "The Court of Gayumars", attributed to Sultan Muhammad, circa 1522–1525, from the Tahmasp Shahnama, Tabriz Prayer in the Mosque Artist: Jean-Léon Gérôme (French, Vesoul 1824–1904 Paris) Date: 1871 Medium: Oil on canvas Dimensions: 35 x 29 1/2 in. Akbar Inspecting the construction of Fatehpur Sikri, 1586 Artsist: Tulsi (artist, composition, maker) Bandi (artist, colours and details, maker) Madhav Khord (portraits, artist) Buffaloes in Combat, Attributed to Miskin (1570–1604). Illustrated single work. late 16th century, India. Medium: Ink, watercolor, and gold on paper Dimensions: 6 7/8 x 9 1/2in. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/276461922 Information and Password Attacks on Social Networks:: An Argument for Cryptography Article in Journal of Information Technology Research · July 2017
  • 16. DOI: 10.4018/JITR.2015010103 CITATIONS 15 READS 997 3 authors: Some of the authors of this publication are also working on these related projects: OwlBeans View project SentimentAnalysis View project Enrico Franchi Università di Parma 27 PUBLICATIONS 208 CITATIONS SEE PROFILE Agostino Poggi Università di Parma 194 PUBLICATIONS 4,690 CITATIONS SEE PROFILE Michele Tomaiuolo
  • 17. Università di Parma 91 PUBLICATIONS 489 CITATIONS SEE PROFILE All content following this page was uploaded by Michele Tomaiuolo on 03 August 2015. The user has requested enhancement of the downloaded file. https://www.researchgate.net/publication/276461922_Informatio n_and_Password_Attacks_on_Social_Networks_An_Argument_f or_Cryptography?enrichId=rgreq- 235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_2&_esc=publicationCoverPdf https://www.researchgate.net/publication/276461922_Informatio n_and_Password_Attacks_on_Social_Networks_An_Argument_f or_Cryptography?enrichId=rgreq- 235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_3&_esc=publicationCoverPdf https://www.researchgate.net/project/OwlBeans?enrichId=rgreq- 235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_9&_esc=publicationCoverPdf https://www.researchgate.net/project/SentimentAnalysis?enrichI d=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_9&_esc=publicationCoverPdf
  • 18. https://www.researchgate.net/?enrichId=rgreq- 235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_1&_esc=publicationCoverPdf https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r greq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_4&_esc=publicationCoverPdf https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r greq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_5&_esc=publicationCoverPdf https://www.researchgate.net/institution/Universita_di_Parma?e nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_6&_esc=publicationCoverPdf https://www.researchgate.net/profile/Enrico_Franchi?enrichId=r greq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_7&_esc=publicationCoverPdf https://www.researchgate.net/profile/Agostino_Poggi?enrichId= rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_4&_esc=publicationCoverPdf https://www.researchgate.net/profile/Agostino_Poggi?enrichId= rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_5&_esc=publicationCoverPdf https://www.researchgate.net/institution/Universita_di_Parma?e
  • 19. nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_6&_esc=publicationCoverPdf https://www.researchgate.net/profile/Agostino_Poggi?enrichId= rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_7&_esc=publicationCoverPdf https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_4&_esc=publicationCoverPdf https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_5&_esc=publicationCoverPdf https://www.researchgate.net/institution/Universita_di_Parma?e nrichId=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_6&_esc=publicationCoverPdf https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_7&_esc=publicationCoverPdf https://www.researchgate.net/profile/Michele_Tomaiuolo?enrich Id=rgreq-235e97705e4d5d25bc84fe76c5fef1ed- XXX&enrichSource=Y292ZXJQYWdlOzI3NjQ2MTkyMjtBUzo yNTgzMDcwMjE2MDI4MTZAMTQzODU5NjYwMTk5Ng%3D %3D&el=1_x_10&_esc=publicationCoverPdf
  • 20. Information Attacks on Online Social Networks Enrico Franchi, Agostino Poggi and Michele Tomaiuolo Department of Information Engineering, University of Parma, Italy ABSTRACT Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users’ carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems. Keywords: social networks; information security; cryptography; password cracking; social engineering. INTRODUCTION If we have to chose among the innovations of the past decade just a single phenomenon because of its outstanding social impact, that would be the diffusion of online
  • 21. social networks. While some social networking services were already active in the nineties, the capillary diffusion and the sheer number of people involved transformed online social networking in an unprecedented revolution only recently. Online social networks have already modified the way people interact. They allow users to reconnect with old friends, or to establish new connections with unknown people. In general, users are facilitated in maintaining and developing the relationships with their acquaintances, on the basis of common activities, interests, and contacts. From a technological perspective, online social networks are mostly based on sets of web-based services that allow people to present themselves through a profile, to establish connections with other users in the system, and to publish resources. Moreover, these systems use common interests and the natural transitivity of some human relationships to suggest new contacts with whom to establish a connection. Although some of these aspects already appeared in other systems, online social networks represent an unprecedented cultural phenomenon. It is mainly characterised by the unceasing flow of information that users publish in such systems, and their relentless strife to increase the number of their virtual friends and acquaintances. Unfortunately, online social networks are becoming an interesting target for crackers and scammers alike. In fact, many factors concur to attract malicious actions: (i) the users’ carefree attitude in sharing information, (ii) the often sub-par security measures from the part of the system operators, and (iii) the high value of the published information. In particular, the information available through social media can be used to trigger attacks to even more sensible targets.
  • 22. Various forms of social engineering inside the system, including sophisticated and long term attacks, may be facilitated by the general sense of sociability shared by users, which per se is an intrinsic objective of social media. However, while the only lasting solution to privacy and security issues would be increasing the users awareness, much can and shall be done at the system level in order to protect the data with cryptography and to decrease the impact of wrong choices and mistakes on the user’s part. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems. SECURITY THREATS ASSOCIATED WITH SOCIAL MEDIA Nowadays, online social networks involve people from the entire world, of any age and with any kind of education. They also helped to increase computer usage among categories that previously showed little interest for it (Stroud, 2008). The users of information systems have various types of security requirements, including: confidentiality, integrity, accountability, availability and anonymity. The same security requirements can be applied to social networking platforms, as well. Unfortunately, while most users are aware that their profile and the information they publish is essentially public, they usually strengthen their privacy settings only after problems arise and tend to overlook the actual impact of the information they disclose
  • 23. (Stroud, 2008). Apparently harmless information can be exploited, and the more information the attacker has, the more severe and sophisticated the attack can be. For example, name, location and age can be used to connect a profile to a real-world identity for more than half of the residents in the USA (Irani et al., 2011). In fact, social networking platforms are susceptible to different types of attacks, targeting different components, conducted from different domains, using different techniques. For better analysing these attacks, it is useful to identify the main abstract components of a generic social networking platform, corresponding to different functional aspects of those systems. Attackers can target each of the different components, or they can target different levels, possibly with roughly the same logic. We identify four main components: 1. The social networking component. It manages and protects access to the users' personal profiles and the social relationships among users. 2. The content management component. It manages and protects access to all user generated content, including personal status updates, comments, links to other content, photos and multimedia galleries. 3. The infrastructure services component. It provides the basic infrastructure services needed to run the social networking platform, including storage and replication services for content and profiles, information indexing and routing, management of users' online presence.
  • 24. 4. The communication and transport component. It encapsulates basic inter-networking and ad- hoc networking functionalities. Moreover, we can distinguish two different kinds of attackers: 1. Intruders. An attack can be conducted by users accessing the system without proper authorization, or with accounts created for conducting the attack, purposely. 2. Insiders. Also legitimate users or entities participating in the systems operations can assume malicious behaviours. From the users point of view, malicious behaviour can also be attributed to the service provider. All the various classical kinds of security attacks may be adapted and applied to online social networks, too. The most typical threats against OSNs include: • Unauthorized Access. Users who have not been granted adequate permissions for accessing some services and resources, may attempt to circumvent the security mechanisms and policies of the system and gain unauthorised access. In a social networking platform, any user who has access to some profiles and messages can harm their legitimate owners. The collection of existing data is the basis of profiling attacks. These data may also supply some knowledge for secondary data collection from a wide range of different sources, including other OSNs. Remote access can also occur at system level. In this case the
  • 25. attacker may directly gain control of all resources. • Social engineering. In a social networking application, a common attack is to psychologically manipulate a user into performing misguided actions. It is similar to a confidence trick or a traditional fraud, but by means of computer-based communications and online social networking, typically to gain access to confidential information. In a phishing scheme, the attacker masquerades as a trustworthy entity to obtain the desired information. In most cases the victim and the attacker never acknowledged each other directly in real life. • Masquerading. When a rogue user disguises his identity and claims the identity of another user, the former is said to be masquerading. Masquerading may be attempted by an attacker either during a conversation or while registering his own profile, for deceiving other users or the whole social networking platform. Sometimes, masquerading is the first step to gain access to infrastructure services and resources to which the attacker is not entitled. Simple impersonation, by cloning the victim's profile from the same platform or by porting profile data from a different platform, may easily lead the attacker to gain trust from the victim's contacts. This way, it can damage other users eventually deceived. Especially in communities where reputation is valued, masquerading can also damage the user whose identity has been stolen. In fact, the attacker may pretend to be another user in order to shift the blame for any liable action.
  • 26. We will provide some examples and a discussion of these threats in the following subsections. However, also other traditional security attacks can be conducted against OSNs, including: • Denial of Service (DoS). The services and communications at the infrastructure level can be disrupted by common denial of service attacks. Social networking platforms are also susceptible to all the conventional denial of service attacks aimed at the underlying operating system or communication protocols. In addition to attacking the whole infrastructure of a social networking platform, users can also launch denial of service attacks against specific users, especially in a distributed platform. For example, repeatedly sending messages or other spam may place undue burden on the recipient users and their systems. Malicious users can also intentionally distribute false or useless information to prevent other users from completing their social activities. • Repudiation. In general, repudiation occurs when a user, after having performed some action, later denies that action having happened (at least under his responsibility). Repudiation can be intentional or even accidental. It can also be the result of a misunderstanding, when users have a different view of events. In any case it can generate important disputes. In a sense, nothing can prevent a user from repudiating one of his actions. But a social networking platform can eventually help resolving disputes by providing needed
  • 27. evidence, if it maintains a sufficiently detailed log of events. For users who value their reputation, the availability of such evidence may constitute a valid deterrent. • Eavesdropping. The attempt to observe the flow and possibly the content of confidential messages is one of the most classical security threats. Apart from reading the content of messages, which may require cryptanalysis, an eavesdropper may gather useful information by simply observing the pattern of messages and their recipients, for example inferring the type of services being requested. To eavesdrop on other users, an attacker may also exploit the infrastructure and communication services of the platform, e.g. through unauthorized access. • Alteration. When a user signs up a social networking service, he starts exposing his profile and content to the platform. An attacker may tamper with the profile and content data published by the victim, with all the messages he communicates to other users and all data used on the infrastructure services. Alteration can also be conducted by the service operator, which provides the facilities for online social networking and may take control of published data. Alteration may take the particular form of filtering, or censorship, when applied systematically for removing undesired content from the OSN. • Copy and Replay. Each action in a social network may be subject to copy and reply. In this type
  • 28. of security threat, an attacker attempts to intercept some data and clone it, for retransmitting it later. The interceptor may successfully copy and replay a message, a complete profile or any other data. If those data are not associated with a signature and a timestamp, the repeated reception of such copies may pass unnoticed and accepted as a legitimate action. Types of information leaks from OSNs According to Li, Li and Venkatasubramanian (2007), there are two types of privacy attacks in online social networks: 1. Identity disclosure. It occurs when the adversary is able to determine the mapping from an anonymous profile to a specific real-world entity (e.g. an individual). 2. Attribute disclosure. It occurs when an adversary is able to determine the value of a user attribute that the user intended to stay private. Moreover, attackers may gather data from: 1. A single social networking platform. 2. Multiple platforms, services or extension apps. Sensible data may be obtained both through: 1. Direct access, either through an authorized service or through some breach, and 2. Attribute inference, based on public data available about a user's contacts, and the correlation usually existing among attributes of linked profiles.
  • 29. Either about identity or attributes, privacy in online social networks is mostly intended as user-to-user privacy: even when the relative settings are set correctly, so that no other user in the system can access information not intended for his eyes, the system itself has full access to information. In fact, in most online social networks, the system owners actually rely on such information to make a profit, for example to improve the accuracy of target advertisement. Unfortunately, as long as they have full access to the information – i.e., the information is available in the system in the clear – any security issue or naivety results in privacy violations. Even innocuous features can be easily become serious issues. For example, in order to promote the service, Facebook had a public directory containing the names of the users that used to be presented along with 10 random friends of theirs. Such feature allowed web-spiders to repeatedly request pages from such directories and essentially discover the structure of the network. Subsequently, the number of friends was reduced to 8 and the selection of friends became a deterministic function of the IP address of the requester. However, even the greatly reduced information can still be used to violate privacy (Bonneau, 2009). Another very relevant problem is the amount of integration we expect from digital services. Online social networks are relatively open system that can be enhanced by third party widgets and games, usually called apps, which are embedded in the user’s pages and typically have access to some amount
  • 30. of user information. Moreover, the users often want different services to interoperate for various reasons, so that, for example, a new tweet is also notified to the Facebook friends or pictures stored on Flickr are accessed by an online printing service. Eventually, the credentials of the online social network can be used, in many cases, to log in a different system without needing a separate account. The problem is that when any of these external services, systems or apps is violated, private information can be stolen. For example, in June 2012, although the main Twitter servers were not compromised, sensible data was nonetheless stolen from a third party widget, TweetGif (Robertson, 2012). Similarly, we expect our mobile devices to interact cleverly with the online social networks. Service providers create mobile applications, which, in turn, have some degree of access to the data stored on the mobile device. Although such applications usually do not maliciously access user’s data for purposes different from those stated, sometimes privacy is neglected. For example, the iPhone LinkedIn App used to send all the user’s calendars to central LinkedIn servers, including phone numbers, call details and passcodes, while only the relevant information should have been sent (Cheng, 2012). Even when the social networking platform does not provide data directly, yet many supposedly private properties may be inferred about a user. In fact, in social networks the attributes of users who share some kind of link are often correlated. Zheleva and Getoor (2009) introduce different models of attacks, to infer the hidden sensitive values on the basis of friendship links or public group membership
  • 31. data. Specifically: • Friend-aggregate. It looks at the sensitive attribute distribution amongst the friends of the person under question. • Collective classification. It aims at inferring class labels of linked objects together, instead of classifying each instance independently of the rest. It iteratively uses inferred values for connected private profiles, in addition to public ones. • Flat-link. It deals with links by flattening the data and considering the adjacency matrix of the graph. Each user has a list of features, corresponding to the size of the network. The public profiles are used as a training set for the classifier. • Blockmodelling. It is a stochastic model, supposing that users form natural clusters or blocks. Then, their interactions can be explained by the blocks they belong to. • Groupmate-link. In this model, groupmates are considered as friends to whom users are implicitly linked. It assumes that each group is a clique of friends. Thus, it creates a friendship link between users who belong to at least one group together, without representing the strength of the link. The resulting network can then be analysed using one of the previous models. • Group-based classification. It considers each group as a feature in a classifier, and sensitive
  • 32. attributes are inferred from the groups a user belongs to. • Basic. It calculates the overall marginal distribution of public data and uses it to infer sensitive attributes of private profiles. This is the simplest model, which can be applied also in the absence of relationship and group information. Phishing and impersonation attacks Social engineering has always been a major security threat to information systems. Two of the more frequent kinds of social engineering attacks, i.e., pretexting and phishing, require some background information, but such information was not always easy to obtain. In fact, some of the early social engineering attacks actually involved going through company or people's trash bins in order to find scraps of paper containing relevant information. Nowadays, many interesting pieces of information are publicly available in social networking systems or accessible only to victim's friends at best (or at worse, from the attacker’s perspective). Traditional phishing consisted in sending electronic communications to a huge number of individuals with the intent to have them disclose some relevant information, such as passwords or credit card numbers. Since the large scale of such attacks, even if only few users actually trusted the communication and disclosed information, it was nonetheless enough to make the attack profitable. Such communications typically used very generic ways to address the victim and typically avoided any specific detail so that the same message could be sent to all the recipients. Nowadays, people have been instructed not to trust such generic messages, and other forms of
  • 33. phishing were created. Spear phishing is a form of phishing where the attack is directed against a single individual and the offending communication contains large amounts of information on the victim himself, in order to convince him of the communication authenticity. This strategy is very effective both if the information employed is public but the victim somewhat thinks it is not or if the attackers gained access to private information by other means. Another popular form of phishing is cloning: a cloning attack requires an original legitimate message that is subsequently tampered and sent the victims. These communications look extremely authentic, but nonetheless they contain ways to direct the victims towards the attackers website (where he is usually requested his credentials). Data- leaks offer an even more dangerous variant: when the data leak becomes public, users expect their service providers to send them emails notifying them to change their password. If such mails are instead well-crafted phishing emails, that perhaps also use some private information about the user, many more people fall for the scam. The kind of attack just described actually happened in the days immediately after the LinkedIn breach. A serious weakness in many online services regards the “security questions”. In fact, while phishing can be avoided by paying attention to the actual identity of the communications initiators, not much can be done against “security questions” attacks. Some services allow the users to choose the security questions so that the information required to answer it correctly is not publicly available, however, for many other sites only a closed list of security questions is available. Researchers estimated that more than 33% of the security questions involve names of relatives or
  • 34. friends and about 16% involve personal preferences (“favorite something”). Popular security questions are also the name of a pet (typically the current or first one), ZIP code or social security number (Rabkin, 2008). The victim in online social networks often directly or indirectly divulges such pieces of information. Even apparently safer information, such as social security numbers, may be guessed with high confidence from publicly available data (Acquisti & Gross, 2009). This kind of attacks is usually not directed towards online social networks, at least initially, but usually targets email service providers, because, when the security question is answered correctly, most systems send a password-reset email, and, consequently, controlling the main email account is necessarily the first step. Similarly to spear phishing, security- question related attacks target only specific individuals. Popular examples are the violation of Sarah Palin's email account in 2008, using information publicly available on Wikipedia and on official websites and, more recently, the attack against Mat Honan. In the latter case, the tech journalist had his mail, iCloud and Twitter accounts compromised after an elaborate chain of social attacks, during which also his mobile phone, tablet and laptop have been remotely wiped (Honan, 2012). Another typical attack on social networking systems is impersonation (identity theft), which can occur either on a site where the victim already has a profile (profile cloning) or on different site (cross-site profile cloning). In both cases, it is easy to convince the victim’s acquaintances to accept friendship
  • 35. from the fake profile and subsequently to disclose confidential data. Experiments on the effectiveness of impersonation have been conducted and the results show that such attacks mostly succeed (over 50% success rate) even in the case of simple non-cross-profile cloning (Bilge et al., 2009). When the attackers obtain credential for an online social network profile, additional attacks can be performed. If the attackers are interested in keeping a private database containing the violated accounts data, they can create a widget that copies the relevant resources or simply scrapes the web pages. Moreover, they can try to use the same credential to attack the user’s accounts in other online services. Since users do not often use different passwords for different accounts, this strategy …