Virtual office hours as cyberinfrastructure: the case study of instant messaging

2009 ◽  
Vol 3 (3) ◽  
pp. 115-130 ◽  
Author(s):  
Jeren Balayeva ◽  
Anabel Quan-Haase
2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2021 ◽  
Vol 4 (3) ◽  
pp. p1
Author(s):  
To Phuong Oanh

This paper aims to investigate the prevalence of cyberbullying among Vietnamese adolescents. Special emphasis was placed on gender differences regarding different forms of cyberbullying and victimization. In this study, 200 middle school students from four state schools in Vietnam were online surveyed to obtain information about the prevalence of cyberbullying and victimization. The results show that most of the students used the Internet daily and that almost all of them possess mobile telephones. On average, 7% of students reported that they have cyberbullied others online, whilst 14% of them were victims of cyberbullying. The most common types of victimization reported by students were harassment including “prank or silent phone calls” or “Insults on instant messaging and website”. There were not any significant gender differences in cyberbullying and being victimized by cyberbullies than females.


Author(s):  
Nancy Johnson

The St. Paul Companies has successfully implemented a virtual office (VO) working environment for their US distributed construction risk control and commercial risk control employees over the past six years. The program goals of operating more cost effectively, increasing contact of the risk control specialists with their customers, and reducing office space costs for The St. Paul Companies have been met. There are many good practices that have been developed over the six years of offering the program, and more refinements and changes planned. As the communications and computer technologies advance, facilitation of working from remote sites improves. While it is easier for employees to work from remote sites, maintaining the boundaries between work and personal lives is more challenging. Improving the VO employees’ and corporate employees’ understanding of the other’s working conditions is necessary to improve relationships and the acceptance of change. The concept of VO work is well established within the organization, and the demand for it is growing.


2021 ◽  
Vol 11 (17) ◽  
pp. 7789
Author(s):  
Asmara Afzal ◽  
Mehdi Hussain ◽  
Shahzad Saleem ◽  
M. Khuram Shahzad ◽  
Anthony T. S. Ho ◽  
...  

Instant messaging applications (apps) have played a vital role in online interaction, especially under COVID-19 lockdown protocols. Apps with security provisions are able to provide confidentiality through end-to-end encryption. Ill-intentioned individuals and groups use these security services to their advantage by using the apps for criminal, illicit, or fraudulent activities. During an investigation, the provision of end-to-end encryption in apps increases the complexity for digital forensics investigators. This study aims to provide a network forensic strategy to identify the potential artifacts from the encrypted network traffic of the prominent social messenger app Signal (on Android version 9). The analysis of the installed app was conducted over fully encrypted network traffic. By adopting the proposed strategy, the forensic investigator can easily detect encrypted traffic activities such as chatting, media messages, audio, and video calls by looking at the payload patterns. Furthermore, a detailed analysis of the trace files can help to create a list of chat servers and IP addresses of involved parties in the events. As a result, the proposed strategy significantly facilitates extraction of the app’s behavior from encrypted network traffic which can then be used as supportive evidence for forensic investigation.


Author(s):  
Alek Tarkowski

Internet applications such as Web-based blogging and instant messaging tools or social networking sites often provide their users with the possibility of displaying small graphic elements. Such “pictures” or “icons” allow users to represent and mutually identify themselves. This text is an analysis of user icons displayed on the LiveJournal blogging site. I treat such a user icon as a medium with particular characteristics and patterns of usage. LiveJournal users use such icons to participate in what John Fiske (1992) calls popular culture. A case study of user icons discloses the life cycle of the media form, during which a medium with initial characteristics coded by its creators begins over time to support a wide variety of uses, innovation in usage, and active participation in culture. In this chapter, I consider user pictures and practices that are tied to them as an example of the manner in which popular culture functions in the digital age.


Author(s):  
Nancy Johnson

The St. Paul Companies has successfully implemented a virtual office (VO) working environment for its construction risk control and commercial risk control employees over the past six years. The program goals of operating more cost-effectively, increasing contact of the risk control specialists with their customers, and reducing office space costs for The St. Paul Companies have been met. There are many good practices that have been developed over the six years of offering the program, and more refinements and changes planned. As the communications and computer technologies advance, facilitation of working from remote sites improves. While it is easier for employees to work from remote sites, maintaining the boundaries between work and personal lives is more challenging. Improving the VO employees’ and corporate employees’ understanding of the others’ working conditions is necessary to improve relationships and the acceptance of change. The concept of VO work is well established within the organization, and the demand for it is growing.


2005 ◽  
Vol 10 (4) ◽  
pp. 00-00 ◽  
Author(s):  
Anabel Quan-Haase ◽  
Joseph Cothrel ◽  
Barry Wellman
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document