Cyber Espionage

Author(s):  
Mohamed Fazil Mohamed Firdhous

In today's world, information plays a vital role in determining the success of many endeavors. Hence, people try to gain access to information by employing many techniques that are not used under normal circumstances. Today Internet is an important resource in the lives of people and carries a vast amount of information. Hence gaining access to this information through some surreptitious means is known as cyber espionage. Cyber espionage has been a real threat to the users as it compromises the security of their precious information. Cyber espionage could be carried out by individuals, organizations or governments targeting individuals, organizations and states for obtaining information for personal, economic, political or military advantages over the other. In this chapter, the author takes an in depth look at the attacks carried out three main domains of the Internet, namely social networks, websites and email. The author not only discusses the attacks and the mechanisms used, but also proposes the precautionary methods that can be employed to protect these resources.

2021 ◽  
Vol 19 (34) ◽  
Author(s):  
Jelena Jevtić ◽  
Milan S. Dajić

Social networks are a way of creating a virtual identity and entering into relationships with strangers in a series of interactions that were not known to a man before the existence of the Internet. Mobile phones and the virtual world often create a personality of a person that is not the same in the real world. It can be said that technology has changed the course of humanity and human consciousness and contributed to many changes in the mentality of society, especially among the youth. Children are often overwhelmed by materialism and jealousy, which further encourages them to become an unconscious, immoral and unambitious population. One of the negative effects of social networks is the abuse of privacy, which is also becoming a growing problem everywhere in the world and should not be ignored. However, a positive attitude should be maintained when it comes to social networks, because they facilitate communication, access to information and learning, greater availability of services and free advertising of some products or services. High school students use the Internet intensively every day, and the work raises the question of whether they use it constructively or destructively. The research was conducted in 2019, the population of high school students was observed and 100 students were included on the territory of Belgrade, Niš and Vitina.


2019 ◽  
Vol 6 (6) ◽  
pp. 553-574
Author(s):  
Eric Dahlin ◽  
Mikaela Dufur ◽  
Dallan Flake

The Internet provides individuals with new avenues for knowledge sharing and collaboration, two key ingredients for the production of novelty. Despite the unprecedented access to information and potential collaborators provided by the Internet, however, organizations remain the preeminent site of invention, presumably due to the tremendous resources, technology, and expertise at their disposal. Given the presumption that improved access to the Internet cultivates connectivity and novelty among individuals, on one hand, and the resources organizations can leverage to create novelty, on the other hand, we ask whether Internet access plays a role in the incidence of collective invention for independent inventors and organizational inventors in the knowledge economy. Regression models based on a sample of metropolitan areas in the United States predict that increases in household Internet access increases collective invention for organizational patent inventors, but not independent patent inventors.


Author(s):  
Dianne Currier

It is now commonly accepted that the appearance and expansion of Internet-based communication has given rise to new possibilities for forging social networks and establishing “communities of interest.” One such ‘interest group’ which has found a community online comprises those who wish to end their lives. This has become a cause for concern to public health officials, governments, and suicide prevention professionals, while on the other hand possibilities for outreach and prevention in the new medium are being explored. The ways in which suicidal individuals have availed themselves of the information resources and connective possibilities of the Internet are outlined below, along with how governments and other parties interested in suicide prevention have responded to this new domain of risk.


Author(s):  
José Poças Rascão

The objective of this work is, on the one hand, to study the new competitive forms that correspond to the development of the different markets linked to electronic platforms and social networks on the internet and, on the other hand, to develop a proposal for social welfare for the positive and negative impacts produced by the development of these markets. In the first part, the main social and economic changes inherent to political and social evolution are addressed. The main logical trends of the market are presented about production and modalities of information appropriation, in particular the new forms of information asymmetries in the electronic market.


2021 ◽  
Author(s):  
Anzhela BORSHCHEVSKA ◽  
◽  
Serhii KYRYLIUK ◽  

We live in a world whose dynamics are dangerous on the one hand and attractive on the other. The intensity of communication and its diversity weaken the sense of spiritual connection with the Other. People increasingly prefer to build close relationships through the Internet and social networks. A new type of loneliness is formed than the one we felt in the "pre-gadget era". All human beings must take care of others. It makes life meaningful and gives a chance to feel happy. Key words: relationships, happiness, meaningfulness, loneliness, virtualization


Somatechnics ◽  
2011 ◽  
Vol 1 (2) ◽  
pp. 253-271
Author(s):  
Mark Davis

This paper explores the relation between internet technologies and social change with reference to the narratives of ordinary internet-users living in Melbourne, Australia. The argument developed here draws attention to the interviewee's imaginaries of being-in-the-world under internet-related change; imaginaries which are, at times, marked by a language of emotional and bodily transition. This framing of life with the internet suggests that its technologies are not merely the means by which people gain access to information, advice, services and social interaction; they appear to mobilise questions of being and at the same time offer themselves as the means for establishing ‘beingness’, to borrow a term from Valerie Walkerdine (2010) . This emphasis on being in accounts of internet-related change also suggests the exercise of narrative subjectification through internet technologies or, in other terms, the internet-related ‘technologisation’ of narrative practices.


2015 ◽  
Vol 09 (04) ◽  
pp. 523-545 ◽  
Author(s):  
Shao-Ting Wang ◽  
Jennifer Jin ◽  
Pete Rivett ◽  
Atsushi Kitazawa

Graph databases can be defined as databases that use graph structures with nodes, edges and properties to store data. Semantic queries and graph-oriented operations are used to access them. With a rapidly growing amount of information on the Internet in recent years, relational databases suffer performance degradation as a large number of nodes are added due to the number of entries in join tables. Therefore, based on the network nature of Internet activities, graph databases are designed for fast access to complex data found in social networks, recommendation engines and networked system. The main objective of this survey is to present the work that has been done in the area of graph database, including query languages, processing, and related application.


Skhid ◽  
2021 ◽  
pp. 58-64
Author(s):  
KYRYL DZIHORA

The article clarifies the socio-philosophical nature of censorship, the methods of its action and the restrictions it may impose on the information presented on social networks. Using specific examples from the work of social networks, the author argues that censorship creates the availability of information. The problem of user's subjectivity in the virtual space have been described. The complexity and contradiction of the phenomenon of censorship on the Internet have been disclosed. Technical, non-technical and indirect methods of implementing censorship frameworks for information in cyberspace have been analyzed. The technical methods are described in more detail in the article. They were grouped according to the following classification: methods that slow down the operation of services; methods that block the activity of services; methods that block information with human participation; methods that block information using algorithms; marking information as unreliable It is stated that censorship today complicates access to information instead of completely blocking it. The problem of new type of censorship on the Internet created by the recommendation systems have been considered. It is noted that the use of these systems enhances the subjectivity of users, and leads to the creation of echo cameras. Thus, the research hypothesis stating that “availability of information generates censorship” was confirmed with the above arguments and examples from the work of social networks.


2003 ◽  
Vol 35 (7) ◽  
pp. 1223-1243 ◽  
Author(s):  
Sarah Niles ◽  
Susan Hanson

For those who have online access, the Internet significantly reduces the cost and time of transferring information over distance. This paper explores the potential of the Internet to improve people's employment opportunities by increasing their access to job information beyond that provided via their grounded social networks. Information circulating through grounded social networks is biased socially and geographically toward the life experiences of network members. The tendency for those members to have similar life experiences dampens the variability in the information exchanged in such networks. What is the potential for the Internet to expand people's access to information about jobs and employers' information about workers? We report on a pilot study undertaken in Worcester, Massachusetts, that examined employers' use of Internet recruiting for employees. The results of this qualitative study indicate that these employers use the Internet strategically to enhance the volume of applications when the labor market is tight and to segment the applicant pool when the market loosens and the number of resumes is overwhelming. As a result, we conclude that many grounded social relations that have been integral to the hiring process are resilient to the Internet; pre-Internet geographies shape Internet geographies, and grounded social relations continue to define access to information about job opportunities even online.


Author(s):  
G. Bhojaraju ◽  
Sarah Buck

Portals are becoming more and more ubiquitous on the Internet and that is why their architecture is a topic of concern among domain stakeholders. In order to ensure a solid architecture in portal design, ontologies must be considered as a necessary agent of design. An ontology provides a classification system for all the data and metadata in a domain. Ontologies supply metadata in order to bring about a streamlined delivery of information to users. While portals exist in order to assist users gain access to information, ontologies enhance portals by providing access to relevant information.


Sign in / Sign up

Export Citation Format

Share Document