Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
"The extent to which the ‘good life’ has been threatened in cyberspace by artificial dialogue systems (chatbots), designed to deceive and defraud, is not yet known. Poster presented at ICIAC 2012 Manchester, 1314 December: http://www.ucl.ac.uk/jdi/events/int-CIA-conf/Abstracts_ICIAC12/ICIAC12_Posters
Attribution of cybercrimes is significant in limiting the rate of crime as well as in preparing the required level of response. Motivated by this significance, we introduce a level-based approach for achieving attribution. In our proposed approach, attribution consists of three steps: (1) identification of the cyberweapon used; (2) determination of the origin of the attack; and (3) identification of the actual attacker. We conduct an in-depth analysis of recently proposed attribution techniques. Our analysis reveals that indirect methods of attribution are particularly effective when attributing cybercrimes; many of them remain unattributed. We also discuss some of the legal issues pertaining to attribution, and we argue that well-defined international laws for cyberspace along with strong cooperation among governments are needed to track down and punish cybercriminals.
2018 •
Book three in the Cyber Library Reference Book series
Journal of Language and Social Psychology
Assessing Gender Authenticity in Computer-Mediated Language Use: Evidence From an Identity Game2004 •
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the services they provide.[1] It includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection,[2] and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.[3] The field is of growing importance due to the increasing reliance on computer systems in most societies.[4] Computer systems now include a very wide variety of "smart" devices, including smartphones, televisions and tiny devices as part of the Internet of Things – and networks include not only the Internet and private data networks, but also Bluetooth, Wi-Fi and other wireless networks.
tripleC-Cognition, Communication, Co-operation
ALICE: An ACE In Digitaland2006 •
Artificial linguistic Internet computer entity, A.L.I.C.E. is considered head and shoulders above other artificial conversational entities, an ACE in digitaland. Three times winner of Loebner’s annual instantiation of Turing’s Test for machine intelligence in 2000, 2001 and 2004 judged most human-like machine, A.L.I.C.E. was additionally gold medal champion in 2004, for most knowledgeable programme in Chatterbox Challenge and won bronze medal for most popular ACE. As a modern Eliza, A.L.I.C.E appears as a dark-haired, blue-eyed female avatar, or e-person. The programme’s architecture contains a combinatory scheme including key-word matching, spell checker, grammatical parser, random sentence generator and case-based reasoning or next-neighbour classification. These features allow A.L.I.C.E. to correctly identify the sense of word ‘live’ to produce responses about residential location when asked “where do you live?” and ask question about “subject” being “studied” when presented with “I study a lot”. As a discourse model, discourse features such as information exchange, disclosure of intentions, goals and desires are minimally exhibited in A.L.I.C.E.’s conversations; its verbal behaviour is akin to that of autistic children. However, A.L.I.C.E. type programmes appear on e-commerce Internet sites in a variety of roles; their use will continue to grow as more companies see their deployment as enhancing humancomputer interaction while building brand awareness and increasing sales. ELBOT, Loebner’s 2003 bronze runner up and Chatterbox 2003 winner, is the underlying technology behind text-based dialogical query system Anna, used by Swedish furniture store IKEA. As a virtual customer service agent, NY Wall Street Journal considered it a most useful ACE. As seen in both the Loebner Contests and Chatterbox Challenges, in unrestricted domains these programmes have a long way to go before they are able to constrain their artificial linguistic productivity to that which is meaningful and be deemed intelligent. Nonetheless, in single specialised e-domains ACE are succeeding and with speech-recognition augments will afford natural human-machine interaction.
Proceedings of the Digital Privacy and Security Conference 2020
Proceedings of the Digital Privacy and Security Conference 20202020 •
The Digital Privacy and Security Conference (DPSC) was first published in 2018 with the aim of disseminating the latest academic research on various subjects related to privacy and digital security. The objectives of our mission have been growing as well as the success of the editions of this conference. The conference proceedings aim to publish quality research for the benefit of the global academic community. We believe in the importance of education for society and the need to facilitate knowledge on a global scale. As the digital era matures, cyber security evolves and software vulnerabilities diminish, people however, as individuals, are more exposed today than ever before. In the context of digital privacy and security, attacker breach defences to access sensitive data and resources. The event will take place at the Lusofona University of Porto (ULP) the 15th January, 2020.
Second International Conference on Internet Monitoring and Protection (ICIMP 2007)
Phishing Phishers - Observing and Tracing Organized Cybercrime2007 •
New Media and Society
Identifying risky Internet use: Associating negative online consequences with specific online behaviours2018 •
Virginia Journal of Law & Technology
Virtual Crimes, Real Damages Part II: What Businesses Can Do Today to Protect Themselves from Cybercrime, and What Public-Private Partnerships are Attempting …2012 •
Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1 , pages 203-210
DISTINGUISHING AI FROM MALE/ FEMALE DIALOGUE2010 •
Acta Criminologica Southern African Journal of Criminology
‘YOU’VE RECEIVED A GREETING E-CARD FROM....’: THE CHANGING FACE OF CYBERCRIME E-MAIL SPAM SCAMS Criminologica CRIMSA Conference Special Edition (2) 2008 92 'YOU'VE RECEIVED A GREETING E-CARD FROM....': THE CHANGING FACE OF CYBERCRIME E-MAIL SPAM SCAMS2008 •
New Media and Society
If software is narrative: Joseph Weizenbaum, Artificial Intelligence, and the Biographies of ELIZA2019 •
SSRN Electronic Journal
Crime in Cyberspace: Offenders and the Role of Organized Crime Groups2000 •