Quick Take

“Thinking before posting?” Reducing cyber harassment on social networking sites through a reflective message

Harassment on online social media services or social networking sites is a growing issue and in particular, as there are a large number (1/5th) of Canadian adolescents that suffer victimization it is something that we should be looking at very seriously. Kathleen Van Royen, Karolien Poels and Heidi Vandebosch from Belgium and Philippe Adam from …

Impact of Cyber Attacks on Data Integrity in Transient Stability Control

The development of intelligent energy management or smart grid systems are quite weak advanced however the critical nature of this infrastructure means that the reliability and security of the connected components are concerning. Maintaining energy stability across variations in generation and demand depends on the ability of the synchronous generators in the power system to …

Image-Centric Social Discovery Using Neural Network under Anonymity Constraint

A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …

I Don’t Use Apple Pay Because It’s Less Secure …: Perception of Security and Usability in Mobile Tap-and-Pay

Apple Pay was launched more than 3 years ago to provide a “fast and secure” method of payment and quickly became very popular in the US. It was shortly followed by Android Pay which is also becoming popular.  However, not everyone uses these systems despite their claimed security, convenience and speed. Jun Ho Huh, Saurabh …

Privacy Loss in Apple’s Implementation of Differential Privacy on MacOS 10.12

Differential privacy (DP) provides a way to quantify privacy. A privacy budget quantitatively measures by how much the risk to an individual’s privacy may increase due to the inclusion of certain data. The higher the value, the less privacy protection is provided. This paper by Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang identifies the components …

Mining the Networks of Telecommunication Fraud Groups using Social Network Analysis

Telecommunications fraud groups, the ones running scams over the telephone are a problem around the world. Taiwan is no exception with a number of related arrests in the past decade.  Telecom fraud group. Yi-Chun Chang, Kuan-Ting Lai, Seng-Cho T. Chou and Ming-Syan Chen wanted to learn more about how these fraud groups operate through Social …

Online Sexual Violence, Child Pornography or Something Else Entirely? Police Responses to Non-Consensual Intimate Image Sharing among Youth

The sharing of intimate images by digital means is something that has created new issues for Canadians.  This is reflected in the creation of laws for non-consensual intimate image sharing or ‘revenge porn’ laws.  The issues get murkier when it comes to intimate images and youth as child pornography laws often also apply to the …