The utopian vision of cyberspace saw us move beyond all the limitations of the physical. Transcendent beings of light we would leave behind greed, hate and discrimination. Is this fictional future possible, or are we destined to bring our faults with us into cyberspace? Are our online services countering or contributing to discrimination online. Karent …
How are those with intellectual disabilities affected by cyberbullying? The research team of Cristina Jenaro, Noelia Flores, Vanessa Vegab Maribel Cruz, Ma. Carmen Pérez, and Víctor A. Torres from the Universidad de Salamanca in Spain, the Pontificia Universidad Católica de Valparaíso in Chile, and the Universidad Autónoma de San Luis Potosí in Mexico provide …
A rowhammer attack exploits a vulnerability created by the physical characteristics of modern computer memory. Dynamic Random-Access Memory (DRAM) is a high-speed memory circuit that stores information by creating an electrical charge in tiny capacitor; which is something like a battery. A charged capacitor represents a value (i.e.”1”) as opposed to an uncharged capacitor (“0”). …
People often make predictable passwords. They use common methods to create passwords such as common words, substituting characters or using patterns on the keyboard. Blase Ur from the University of Chicago and a team from Carnegie Mellon University developed and evaluated a password security meter that provides a more accurate rating of password strength and …
Governments around the world are being increasingly trapped between progress to a digital state and the insecurity of cyberspace. Estonia has been a vanguard for development of a digital society in many ways by transitioning many services to digital technologies and also by being subject to assault by cyber weapons. Nick Robinson and Prof Keith …
Criminals documenting themselves doing something illegal seems counterproductive. Creating a video that could prove their guilt seems bizarre. Even though it is illogical, it still happens. Sveinung Sandberg and Thomas Ugelvik looked into this phenomenon. They analyzed 51 Norwegian higher court decisions involving the use of a camera as an integrated part of an offence. …
Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …
Can we do research with data that is leaked or stolen and dumped on the internet? This is an ethical question that is difficult to answer as it quickly gets complicated. Unfortunately, WWJD? is of no help in a lot of situations. Ideas about research ethics developed before the information age can fall short where …
The development of intelligent energy management or smart grid systems are quite weak advanced however the critical nature of this infrastructure means that the reliability and security of the connected components are concerning. Maintaining energy stability across variations in generation and demand depends on the ability of the synchronous generators in the power system to …
A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …