Open Access. Powered by Scholars. Published by Universities.®

Communication Technology and New Media Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 17 of 17

Full-Text Articles in Communication Technology and New Media

Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen Oct 2023

Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen

Senior Theses

The ubiquity of social media has enabled an unprecedented amount of personal data to be accessible to various entities. Social media platforms leverage this data to optimize algorithmic recommendation systems, persuade users to engage, and promote monetization. The social media ecosystem’s business model demands continuous engagement and the relentless collection of user data to grow and scale. Not only is social media massively popular around the world, but it has integrated heavily into users’ daily lives. This integration is driven by social platforms’ deliberate architectures and affordances. The intentionality of social media can be exploited by state and non-state actors …


Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha Jun 2022

Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

In the digital age, internet users are exposed to privacy issues online. Few rarely know when someone else is eavesdropping or about to scam them. Companies, governments, and individual internet users are all vulnerable to security breaches due to the challenges of online privacy ranging from trust and hierarchical control to financial losses. As systems advance, people are optimistic that forensic science will provide long-term interventions that surpass the current solutions, including setting stronger passwords and firewall protection. The future of online privacy is changing, and more practical interventions, such as email, malware, mobile, and network forensics, must be integrated, …


Rhetsec_ | Rhetorical Security, Jennifer Mead Dec 2019

Rhetsec_ | Rhetorical Security, Jennifer Mead

Culminating Projects in English

Rhetsec_ examines the rhetorical situation, the rhetorical appeals, and how phishing emails simulate "real" emails in five categories of phishing emails. While the first focus of cybersecurity is security, you must also understand the language of computers to know how to secure them. Phishing is one way to compromise security using computers, and so the computer becomes a tool for malicious language (phishing emails and malware) to be transmitted. Therefore to be concerned with securing computers, then you must also be concerned with language. Language is rhetoric's domain, and the various rhetorical elements which create an identity of the phisher …


Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell Apr 2017

Who R U? Identity Theft And Unl Students, Marcia L. Dority Baker, Cheryl O'Dell

Information Technology Services: Publications

How can academic institutions help educate their students about the risks of identity theft? Or teach students to better understand how one’s online presence can hold so much joy and angst? For one campus, the University of Nebraska–Lincoln, the opportunity came from a middle school teacher engaging his students in a future problem-solving activity. UNL had the opportunity to create a 45-minute presentation on identity theft for local public school students who would be spending the day on campus researching this topic.

While preparing the presentation, we realized a top 10 list on identity theft for UNL students would be …


An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris Oct 2016

An Exploration Of Mobile Device Security Artifacts At Institutions Of Higher Education, Amita Goyal Chin, Diania Mcrae, Beth H. Jones, Mark A. Harris

Journal of International Technology and Information Management

The explosive growth and rapid proliferation of smartphones and other mobile

devices that access data over communication networks has necessitated advocating

and implementing security constraints for the purpose of abetting safe computing.

Remote data access using mobile devices is particularly popular among students at

institutions of higher education. To ensure safe harbor for constituents, it is

imperative for colleges and universities to establish, disseminate, and enforce

mobile device security artifacts, where artifacts is defined as policies, procedures,

guidelines or other documented or undocumented protocols. The purpose of this

study is to explore the existence of, specific content of, and the …


A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe Jan 2016

A Survey Of Social Media Users Privacy Settings & Information Disclosure, Mashael Aljohani, Alastair Nisbet, Kelly Blincoe

Australian Information Security Management Conference

This research utilises a comprehensive survey to ascertain the level of social networking site personal information disclosure by members at the time of joining the membership and their subsequent postings to the sites. Areas examined are the type of information they reveal, their level of knowledge and awareness regarding how their information is protected by SNSs and the awareness of risks that over-sharing may pose. Additionally, this research studies the effect of gender, age, education, and level of privacy concern on the amount and kind of personal information disclosure and privacy settings applied. A social experiment was then run for …


Geointelligence: Data Mining Locational Social Media Content For Profiling And Information Gathering, Peter Hannay, Greg Baatard Aug 2011

Geointelligence: Data Mining Locational Social Media Content For Profiling And Information Gathering, Peter Hannay, Greg Baatard

International Cyber Resilience conference

The current social media landscape has resulted in a situation where people are encouraged to share a greater amount of information about their day-to-day lives than ever before. In this environment a large amount of personal data is disclosed in a public forum with little to no regard for the potential privacy impacts. This paper focuses on the presence of geographic data within images, metadata and individual postings. The GeoIntelligence project aims to aggregate this information to educate users on the possible implications of the utilisation of these services as well as providing service to law enforcement and business. This …


Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo Apr 2011

Cloud Computing: Architectural And Policy Implications, Christopher S. Yoo

All Faculty Scholarship

Cloud computing has emerged as perhaps the hottest development in information technology. Despite all of the attention that it has garnered, existing analyses focus almost exclusively on the issues that surround data privacy without exploring cloud computing’s architectural and policy implications. This article offers an initial exploratory analysis in that direction. It begins by introducing key cloud computing concepts, such as service-oriented architectures, thin clients, and virtualization, and discusses the leading delivery models and deployment strategies that are being pursued by cloud computing providers. It next analyzes the economics of cloud computing in terms of reducing costs, transforming capital expenditures …


Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo Mar 2011

Rough Consensus And Running Code: Integrating Engineering Principles Into Internet Policy Debates, Christopher S. Yoo

All Faculty Scholarship

This is the introduction to a symposium issue for a conference designed to bring the engineering community, policymakers, legal academics, and industry participants together in an attempt to provide policymakers with a better understanding of the Internet’s technical aspects and to explore emerging issues of particular importance to current broadband policy.


Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo Sep 2010

Free Speech And The Myth Of The Internet As An Unintermediated Experience, Christopher S. Yoo

All Faculty Scholarship

In recent years, a growing number of commentators have raised concerns that the decisions made by Internet intermediaries — including last-mile network providers, search engines, social networking sites, and smartphones — are inhibiting free speech and have called for restrictions on their ability to prioritize or exclude content. Such calls ignore the fact that when mass communications are involved, intermediation helps end users to protect themselves from unwanted content and allows them to sift through the avalanche of desired content that grows ever larger every day. Intermediation also helps solve a number of classic economic problems associated with the Internet. …


Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo Jan 2010

Sorting Out Smart Surveillance, David Wright, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, Emilio Mordini, Rocco Bellanova, Paul De Hert, Kush Wadhwa, Didier Bigo

Michael Friedewald

Surveillance is becoming ubiquitous in our society. We can also see the emergence of “smart” surveillance technologies and the assemblages (or combinations) of such tech- nologies, supposedly to combat crime and terrorism, but in fact used for a variety of purposes, many of which are intrusive upon the privacy of law-abiding citizens. Following the dark days of 9/11, security and surveillance became paramount. More recently, in Europe, there has been a policy commitment to restore privacy to centre stage. This paper examines the legal tools available to ensure that privacy and personal data protection are respected in attempts to ensure …


The Changing Patterns Of Internet Usage, Christopher S. Yoo Jan 2010

The Changing Patterns Of Internet Usage, Christopher S. Yoo

All Faculty Scholarship

The Internet unquestionably represents one of the most important technological developments in recent history. It has revolutionized the way people communicate with one another and obtain information and created an unimaginable variety of commercial and leisure activities. Interestingly, many members of the engineering community often observe that the current network is ill-suited to handle the demands that end users are placing on it. Indeed, engineering researchers often describe the network as ossified and impervious to significant architectural change. As a result, both the U.S. and the European Commission are sponsoring “clean slate” projects to study how the Internet might be …


Review Of Existing Australian And International Cyber-Safety Research, Julian J. Dooley, Donna Cross, Lydia Hearn, Robyn Treyvaud Jan 2009

Review Of Existing Australian And International Cyber-Safety Research, Julian J. Dooley, Donna Cross, Lydia Hearn, Robyn Treyvaud

Research outputs pre 2011

Information and communication technologies have permeated almost all areas of society and become an important component of daily functioning for most Australians. This is particularly true for Internet and mobile phone technology. The majority of Australian households (67% in 2007 – 2008) have access to the Internet and over 11 million Australians use the Internet as an integral part of their personal, social and occupational activities. By mid-2008, there were over 22 million active mobile phones being used in Australia, which equates to more than one phone for every citizen. There are many benefits associated with Internet and mobile phone …


Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz Jan 2009

Cookie Monsters: Seeing Young People’S Hacking As Creative Practice, Gregory T. Donovan, Cindi Katz

Publications and Research

This paper examines the benefits and obstacles to young people’s open-ended and unrestricted access to technological environments. While children and youth are frequently seen as threatened or threatening in this realm, their playful engagements suggest that they are self-possessed social actors, able to negotiate most of its challenges effectively. Whether it is proprietary software, the business practices of some technology providers, or the separation of play, work, and learning in most classrooms, the spatial-temporality of young people’s access to and use of technology is often configured to restrict their freedom of choice and behavior. We focus on these issues through …


Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr Dec 2008

Introduction: New Media And The Reconfiguration Of Power In Global Politics, Athina Karatzogianni Dr

Athina Karatzogianni

Whatever the developments and transformations in the sphere of global politics, the new media technologies and the political opportunities they present are unsettling the world system, the are rendering it chaotic and they are having a deeper systemic effect than the more powerful actors care to admit. It remains to be seen whether information age ideologies, new modes of capitalism, conflict, activism, terrorism and war in cyberspace will ever transfer to the ‘real world’ reversing the opposite trend, and causing everyday effects on a bigger scale than we are witnessing today. Even so, we are undoubtedly living in interesting times …


Global Media, Communication Technology, And The War On Terror, James Castonguay Jan 2008

Global Media, Communication Technology, And The War On Terror, James Castonguay

Communication, Media & The Arts Faculty Publications

From the telegraph, radio, film, and television to the Internet and mobile satellite networks, media and communication technologies have been integral to the waging and representation of war. Always eager to improve communications, surveillance, and weapons systems, military institutions have funded and developed new communication technologies and media since at least the 19th century, and journalism and entertainment have long been central to governments’ propaganda efforts. In the current context of the Iraq War and the “war on terror,” most accounts of international communication equate media with news (ignoring other genres) and often neglect the crucial role that audiences and …


Sixth-, Seventh-, And Eighth-Grade Students' Experiences With The Internet And Their Internet Safety Knowledge., Tonya Berrier Dec 2007

Sixth-, Seventh-, And Eighth-Grade Students' Experiences With The Internet And Their Internet Safety Knowledge., Tonya Berrier

Electronic Theses and Dissertations

According to a 2002 National Center for Education Statistics report, 98% of schools in 2001 were connected to the Internet and 63% of public classrooms had Internet connections. According to a 2003 United States Census Bureau report, 68.3% of homes with children subscribed to the Internet. These statistics reveal the scope of access children have to the Internet. This study focused on the children's voice by investigating the children's report of their online activities and their awareness of cyber security, ethics, and safety issues. The purpose of this study was to gain insight into the specific reported online activities and …