Search
Search Results
-
Doxing
The most impressive attribution results are those that identify specific individuals, ideally with their real names and even photos. Objectively... -
HATDO: hybrid Archimedes Tasmanian devil optimization CNN for classifying offensive comments and non-offensive comments
The evolution of social media and online platforms created more opportunities to express one’s thoughts without any burden. This emergence paved the...
-
Enhancing cyberbullying detection: a comparative study of ensemble CNN–SVM and BERT models
Technological improvements have increased the number of people who use online social networking sites, resulting in an increase in cyberbullying....
-
Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024
The increase in internet use, interconnectivity, and affordability of data have intensified online harms, including cyberstalking on social media...
-
Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins
The online sharing of personal health data by individuals has raised privacy concerns. This paper presents a Named Entity Recognition (NER)-based... -
Research with User-Generated Book Review Data: Legal and Ethical Pitfalls and Contextualized Mitigations
The growing quantity of user-generated book reviews has opened up unprecedented opportunities for empirical research on books, reading, and... -
A classification of Antifa Twitter accounts based on social network map** and linguistic analysis
Where machine learning and other quantitative methods have been used for classification purposes in hel** researchers manually identify extremist...
-
Personenbezogene Recherchen – Doxing
Die beeindruckendsten Attributions-Ergebnisse sind solche, die konkrete Personen identifizieren, im Idealfall mit ihren Klarnamen und sogar Fotos.... -
“Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on Weibo
In April 2022, Sina Weibo began to display users’ coarse location for the stated purpose of regulating their online community. However, this raised... -
Social Web Cyber-Sicherheit
In diesem Kapitel werden einige Themen des Social Webs mit der besonderen Sichtweise auf die Cyber-Sicherheit dargestellt und diskutiert. Zu... -
Safety
The previous chapter looked at fairness and explained how it relates to responsible AI. This chapter looks at AI safety and explains how it... -
The worst mistake 2.0? The digital revolution and the consequences of innovation
The invention of agriculture 12,000 years ago has been called the worst mistake in human history. Alongside the social, political, and technological...
-
Cyber Security Issues and Challenges on Non-fungible Tokens
Blockchain Technology helps buy and sell digital assets known as Non-Fungible Tokens (NFT). It is an asset that is not fungible. It is a different... -
Make a Difference in a Different Way: Twitter Bot Creators and Wikipedia Transparency.
Software robots (bots) are a major part of contemporary Internet culture, employed by businesses for customer service, artists for digital...
-
Structured Knowledge Extraction for Digital Twins: Leveraging LLMs to Analyze Tweets
This paper concentrates on the extraction of pertinent information from unstructured data, specifically analyzing textual content disseminated by... -
Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat
Background. Nation states unleash cyber attacks targeting other nation states (e.g. WannaCry, SolarWinds), termed “offensive cyber operations”. When... -
On unique framework-based implementation of a novel image watermarking scheme
To prevail over the trade-offs among the three major parameters, i.e., data transparency, robustness, and hiding capacity, is an enduring crisis in...
-
Understanding Interpretability: Explainable AI Approaches for Hate Speech Classifiers
Cyberbullying and hate speech are two of the most significant problems in today’s cyberspace. Automated artificial intelligence models might be used... -
The Only Link You’ll Ever Need: How Social Media Reference Landing Pages Speed Up Profile Matching
The Web is characterized by user interaction on Online Social Networks, the exchange of content on a large scale, and the presentation of one’s own... -
Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends
For the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system...