Mining the Networks of Telecommunication Fraud Groups using Social Network Analysis

Telecommunications fraud groups, the ones running scams over the telephone are a problem around the world. Taiwan is no exception with a number of related arrests in the past decade.  Telecom fraud group. Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou and Ming-Syan Chen wanted to learn more about how these fraud groups operate through Social …

Critical Infrastructure Threat Landscape: Understanding and Reacting

    Francesca Bosco – UNICRI, Presented at the 2016 Spring SERENE-RISC Workshop. Advances in the field of global technology have transformed the way in which societies function, affecting governments, businesses, and individuals alike, evoking a wide array of societal benefits, while also subjecting populations to varying degrees of cyber risk. Critical infrastructure serves as …

Online Sexual Violence, Child Pornography or Something Else Entirely? Police Responses to Non-Consensual Intimate Image Sharing among Youth

The sharing of intimate images by digital means is something that has created new issues for Canadians.  This is reflected in the creation of laws for non-consensual intimate image sharing or ‘revenge porn’ laws.  The issues get murkier when it comes to intimate images and youth as child pornography laws often also apply to the …

Perspectives on Harmful Speech Online

The Berkman Klein Harmful speech Online project has created a collection of essays that both draw from research and provide opinions to discuss a range of perspectives on this issue of harmful speech online.  It provides pieces looking at Framing the Problem, International Perspectives, and Approaches, Interventions, and Solutions.  This collection could provide a valuable …

Christopher Yang – Social Media Analytics for Intelligence and Security Informatics

From the SERENE-RISC Workshop held in April 2016 in Vancouver, Canada. Social Media Analytics for Intelligence and Security Informatics Christopher Yang – Drexel University In this talk, we’ll discuss some of the social media and data analytics work we have done on the DIBBs data archive. The DIBBS data archive is a 3-year project funded …

How the Chinese Government Fabricates Social Media Posts for Strategic Distraction, not Engaged Argument

There is a considerable amount of evidence on the control and censorship of social media in China.  On top of this there has long been suspected that there is a system of astroturfing, or the posting of large numbers of comments from fake accounts to direct online conversation.  In China people hired to make these …