首页 > 最新文献

Digital Threats: Research and Practice最新文献

英文 中文
Toward a Better Understanding of “Cybersecurity” 更好地理解“网络安全”
Pub Date : 2021-06-08 DOI: 10.1145/3442445
J. V. D. Ham
The term “cybersecurity” has gained widespread popularity but has not been defined properly. The term is used by many different people to mean different things in different contexts. A better understanding of “cybersecurity” will allow us a better understanding of what it means to be “cybersecure.” This in turn will allow us to take more appropriate measures to ensure actual cybersecurity.
“网络安全”一词已经广泛流行,但尚未得到适当的定义。不同的人在不同的语境中使用这个词来表示不同的事物。更好地理解“网络安全”将使我们更好地理解“网络安全”的含义。这反过来将使我们能够采取更适当的措施来确保实际的网络安全。
{"title":"Toward a Better Understanding of “Cybersecurity”","authors":"J. V. D. Ham","doi":"10.1145/3442445","DOIUrl":"https://doi.org/10.1145/3442445","url":null,"abstract":"The term “cybersecurity” has gained widespread popularity but has not been defined properly. The term is used by many different people to mean different things in different contexts. A better understanding of “cybersecurity” will allow us a better understanding of what it means to be “cybersecure.” This in turn will allow us to take more appropriate measures to ensure actual cybersecurity.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129059088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics 结合网络日志和鼠标行为生物识别技术检测高级网络机器人
Pub Date : 2021-06-08 DOI: 10.1145/3447815
Christos Iliou, Theodoros Kostoulas, T. Tsikrika, Vasilis Katos, S. Vrochidis, I. Kompatsiaris
Web bots vary in sophistication based on their purpose, ranging from simple automated scripts to advanced web bots that have a browser fingerprint, support the main browser functionalities, and exhibit a humanlike behaviour. Advanced web bots are especially appealing to malicious web bot creators, due to their browserlike fingerprint and humanlike behaviour that reduce their detectability. This work proposes a web bot detection framework that comprises two detection modules: (i) a detection module that utilises web logs, and (ii) a detection module that leverages mouse movements. The framework combines the results of each module in a novel way to capture the different temporal characteristics of the web logs and the mouse movements, as well as the spatial characteristics of the mouse movements. We assess its effectiveness on web bots of two levels of evasiveness: (a) moderate web bots that have a browser fingerprint and (b) advanced web bots that have a browser fingerprint and also exhibit a humanlike behaviour. We show that combining web logs with visitors’ mouse movements is more effective and robust toward detecting advanced web bots that try to evade detection, as opposed to using only one of those approaches.
网络机器人的复杂程度取决于它们的目的,从简单的自动化脚本到具有浏览器指纹、支持主要浏览器功能并表现出类似人类行为的高级网络机器人。高级网络机器人对恶意网络机器人创建者尤其有吸引力,因为它们类似浏览器的指纹和类似人类的行为降低了它们的可探测性。这项工作提出了一个网络机器人检测框架,包括两个检测模块:(i)利用网络日志的检测模块,(ii)利用鼠标运动的检测模块。该框架以一种新颖的方式将每个模块的结果结合起来,以捕捉网络日志和鼠标运动的不同时间特征,以及鼠标运动的空间特征。我们评估了其对两种规避程度的网络机器人的有效性:(a)具有浏览器指纹的中度网络机器人和(b)具有浏览器指纹并表现出类似人类行为的高级网络机器人。我们表明,将网络日志与访问者的鼠标移动相结合,对于检测试图逃避检测的高级网络机器人更有效、更健壮,而不是只使用其中一种方法。
{"title":"Detection of Advanced Web Bots by Combining Web Logs with Mouse Behavioural Biometrics","authors":"Christos Iliou, Theodoros Kostoulas, T. Tsikrika, Vasilis Katos, S. Vrochidis, I. Kompatsiaris","doi":"10.1145/3447815","DOIUrl":"https://doi.org/10.1145/3447815","url":null,"abstract":"Web bots vary in sophistication based on their purpose, ranging from simple automated scripts to advanced web bots that have a browser fingerprint, support the main browser functionalities, and exhibit a humanlike behaviour. Advanced web bots are especially appealing to malicious web bot creators, due to their browserlike fingerprint and humanlike behaviour that reduce their detectability. This work proposes a web bot detection framework that comprises two detection modules: (i) a detection module that utilises web logs, and (ii) a detection module that leverages mouse movements. The framework combines the results of each module in a novel way to capture the different temporal characteristics of the web logs and the mouse movements, as well as the spatial characteristics of the mouse movements. We assess its effectiveness on web bots of two levels of evasiveness: (a) moderate web bots that have a browser fingerprint and (b) advanced web bots that have a browser fingerprint and also exhibit a humanlike behaviour. We show that combining web logs with visitors’ mouse movements is more effective and robust toward detecting advanced web bots that try to evade detection, as opposed to using only one of those approaches.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114542628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Ecosystem of Detection and Blocklisting of Domain Generation 领域生成的检测与黑名单生态系统
Pub Date : 2021-06-08 DOI: 10.1145/3423951
Leigh Metcalf, Jonathan M. Spring
Malware authors use domain generation algorithms to establish more reliable communication methods that can avoid reactive defender blocklisting techniques. Network defense has sought to supplement blocklists with methods for detecting machine-generated domains. We present a repeatable evaluation and comparison of the available open source detection methods. We designed our evaluation with multiple interrelated aspects, to improve both interpretability and realism. In addition to evaluating detection methods, we assess the impact of the domain generation ecosystem on prior results about the nature of blocklists and how they are maintained. The results of the evaluation of open source detection methods finds all methods are inadequate for practical use. The results of the blocklist impact study finds that generated domains decrease the overlap among blocklists; however, while the effect is large in relative terms, the baseline is so small that the core conclusions of the prior work are sustained. Namely, that blocklist construction is very targeted, context-specific, and as a result blocklists do no overlap much. We recommend that Domain Generation Algorithm detection should also be similarly narrowly targeted to specific algorithms and specific malware families, rather than attempting to create general-purpose detection for machine-generated domains.
恶意软件作者使用域生成算法来建立更可靠的通信方法,可以避免被动防御拦截技术。网络防御一直在寻求用检测机器生成域的方法来补充黑名单。我们对可用的开源检测方法进行了可重复的评估和比较。我们从多个相互关联的方面设计了我们的评估,以提高可解释性和现实性。除了评估检测方法外,我们还评估了领域生成生态系统对关于黑名单性质及其维护方式的先前结果的影响。对开源检测方法的评估结果表明,所有方法都不适合实际使用。区块链影响研究结果发现,生成的域减少了区块链之间的重叠;然而,虽然相对而言影响很大,但基线是如此之小,以至于先前工作的核心结论是可以维持的。也就是说,该块列表构造是非常有针对性的、特定于上下文的,因此块列表不会重叠太多。我们建议域生成算法检测也应该类似地针对特定算法和特定恶意软件家族,而不是试图为机器生成的域创建通用检测。
{"title":"The Ecosystem of Detection and Blocklisting of Domain Generation","authors":"Leigh Metcalf, Jonathan M. Spring","doi":"10.1145/3423951","DOIUrl":"https://doi.org/10.1145/3423951","url":null,"abstract":"Malware authors use domain generation algorithms to establish more reliable communication methods that can avoid reactive defender blocklisting techniques. Network defense has sought to supplement blocklists with methods for detecting machine-generated domains. We present a repeatable evaluation and comparison of the available open source detection methods. We designed our evaluation with multiple interrelated aspects, to improve both interpretability and realism. In addition to evaluating detection methods, we assess the impact of the domain generation ecosystem on prior results about the nature of blocklists and how they are maintained. The results of the evaluation of open source detection methods finds all methods are inadequate for practical use. The results of the blocklist impact study finds that generated domains decrease the overlap among blocklists; however, while the effect is large in relative terms, the baseline is so small that the core conclusions of the prior work are sustained. Namely, that blocklist construction is very targeted, context-specific, and as a result blocklists do no overlap much. We recommend that Domain Generation Algorithm detection should also be similarly narrowly targeted to specific algorithms and specific malware families, rather than attempting to create general-purpose detection for machine-generated domains.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Perfect Storm 完美风暴
Pub Date : 2021-04-28 DOI: 10.1145/3428157
P. Datta, Mark R. Whitmore, Joseph K. Nwankpa
In an age where news information is created by millions and consumed by billions over social media (SM) every day, issues of information biases, fake news, and echo-chambers have dominated the corridors of technology firms, news corporations, policy makers, and society. While multiple disciplines have tried to tackle the issue using their disciplinary lenses, there has, hitherto, been no integrative model that surface the intricate, albeit “dark” explainable AI confluence of both technology and psychology. Investigating information bias anchoring as the overarching phenomenon, this research proposes a theoretical framework that brings together traditionally fragmented domains of AI technology, and human psychology. The proposed Information Bias Anchoring Model reveals how SM news information creates an information deluge leading to uncertainty, and how technological rationality and individual biases intersect to mitigate the uncertainty, often leading to news information biases. The research ends with a discussion of contributions and offering to reduce information bias anchoring.
在这个新闻信息每天由数百万人创造,数十亿人通过社交媒体(SM)消费的时代,信息偏见、假新闻和回声室问题已经主导了科技公司、新闻公司、政策制定者和社会的走廊。虽然多个学科都试图用各自学科的视角来解决这个问题,但迄今为止,还没有一个综合模型能够揭示技术和心理学之间错综复杂、尽管“黑暗”但可解释的人工智能融合。将信息偏见锚定作为首要现象进行调查,本研究提出了一个理论框架,将传统上分散的人工智能技术领域和人类心理学结合在一起。所提出的信息偏差锚定模型揭示了SM新闻信息如何产生导致不确定性的信息泛滥,以及技术理性和个人偏见如何相互作用以减轻不确定性,从而经常导致新闻信息偏差。研究以讨论贡献和提供减少信息偏见锚定结束。
{"title":"A Perfect Storm","authors":"P. Datta, Mark R. Whitmore, Joseph K. Nwankpa","doi":"10.1145/3428157","DOIUrl":"https://doi.org/10.1145/3428157","url":null,"abstract":"In an age where news information is created by millions and consumed by billions over social media (SM) every day, issues of information biases, fake news, and echo-chambers have dominated the corridors of technology firms, news corporations, policy makers, and society. While multiple disciplines have tried to tackle the issue using their disciplinary lenses, there has, hitherto, been no integrative model that surface the intricate, albeit “dark” explainable AI confluence of both technology and psychology. Investigating information bias anchoring as the overarching phenomenon, this research proposes a theoretical framework that brings together traditionally fragmented domains of AI technology, and human psychology. The proposed Information Bias Anchoring Model reveals how SM news information creates an information deluge leading to uncertainty, and how technological rationality and individual biases intersect to mitigate the uncertainty, often leading to news information biases. The research ends with a discussion of contributions and offering to reduce information bias anchoring.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131201965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation 基于博弈论的网络保险覆盖移动恶意软件开发的潜在损失
Pub Date : 2021-04-20 DOI: 10.1145/3409959
Li Wang, S. Iyengar, Amith K. Belman, P. Sniatala, V. Phoha, C. Wan
Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report—data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader, and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data. These insights will be of tremendous help to researchers and practitioners in the security community.
恶意利用软件可能造成巨大损失,因此需要制定网络保险原则。由于各种不确定性,比如恶意应用出现的时间和杀伤力,人们倾向于给下载的应用提供更多特权,而不是延迟或功能带来的不便,移动设备用户的生活方式决定了感染的可能性,以及软件泄露的货币价值等,估计保险内容、保险金额和可能的保费构成了挑战。我们提供了一个以博弈论公式为支持的网络保险理论框架,以计算风险的货币价值和与软件损害相关的保险费。通过建立对手和软件策略之间的纳什均衡条件,我们可以从应用类别(如生活方式、娱乐、教育等)中获得对手的风险、潜在损失和收益的概率,以及它们的流行率。通过对一系列可能性进行模拟,并使用公开可用的恶意软件统计数据,我们提供了有关软件和对手可以采取的策略的见解。我们展示了我们的框架在最新移动恶意软件数据(2018年ISTR报告- 2017年数据)上的应用,其中包括五大Android恶意软件应用:Malapp、Fakeinst、Premiumtext、Maldownloader和Simplelocker,以及由此泄露的电话号码、位置信息和安装的应用信息。我们工作的独特性源于开发数学框架,并通过博弈论策略选择提供估计网络保险参数的见解,并通过展示其对最近真实恶意应用程序数据的有效性。这些见解将对安全社区的研究人员和实践者提供巨大的帮助。
{"title":"Game Theory based Cyber-Insurance to Cover Potential Loss from Mobile Malware Exploitation","authors":"Li Wang, S. Iyengar, Amith K. Belman, P. Sniatala, V. Phoha, C. Wan","doi":"10.1145/3409959","DOIUrl":"https://doi.org/10.1145/3409959","url":null,"abstract":"Potential for huge loss from malicious exploitation of software calls for development of principles of cyber-insurance. Estimating what to insure and for how much and what might be the premiums poses challenges because of the uncertainties, such as the timings of emergence and lethality of malicious apps, human propensity to favor ease by giving more privilege to downloaded apps over inconvenience of delay or functionality, the chance of infection determined by the lifestyle of the mobile device user, and the monetary value of the compromise of software, and so on. We provide a theoretical framework for cyber-insurance backed by game-theoretic formulation to calculate monetary value of risk and the insurance premiums associated with software compromise. By establishing the conditions for Nash equilibrium between strategies of an adversary and software we derive probabilities for risk, potential loss, gain to adversary from app categories, such as lifestyles, entertainment, education, and so on, and their prevalence ratios. Using simulations over a range of possibilities, and using publicly available malware statistics, we provide insights about the strategies that can be taken by the software and the adversary. We show the application of our framework on the most recent mobile malware data (2018 ISTR report—data for the year 2017) that consists of the top five Android malware apps: Malapp, Fakeinst, Premiumtext, Maldownloader, and Simplelocker and the resulting leaked phone number, location information, and installed app information. Uniqueness of our work stems from developing mathematical framework and providing insights of estimating cyber-insurance parameters through game-theoretic choice of strategies and by showing its efficacy on a recent real malicious app data. These insights will be of tremendous help to researchers and practitioners in the security community.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122084089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Perceptions of Human and Machine-Generated Articles 人类和机器生成文章的感知
Pub Date : 2021-04-20 DOI: 10.1145/3428158
Shubhra Tewari, Renos Zabounidis, Ammina Kothari, Reynold J. Bailey, Cecilia Ovesdotter Alm
Automated journalism technology is transforming news production and changing how audiences perceive the news. As automated text-generation models advance, it is important to understand how readers perceive human-written and machine-generated content. This study used OpenAI’s GPT-2 text-generation model (May 2019 release) and articles from news organizations across the political spectrum to study participants’ reactions to human- and machine-generated articles. As participants read the articles, we collected their facial expression and galvanic skin response (GSR) data together with self-reported perceptions of article source and content credibility. We also asked participants to identify their political affinity and assess the articles’ political tone to gain insight into the relationship between political leaning and article perception. Our results indicate that the May 2019 release of OpenAI’s GPT-2 model generated articles that were misidentified as written by a human close to half the time, while human-written articles were identified correctly as written by a human about 70 percent of the time.
自动化新闻技术正在改变新闻生产,改变受众对新闻的看法。随着自动化文本生成模型的发展,理解读者如何理解人类编写的和机器生成的内容是很重要的。这项研究使用OpenAI的GPT-2文本生成模型(2019年5月发布)和来自不同政治派别的新闻机构的文章,研究参与者对人类和机器生成的文章的反应。当参与者阅读文章时,我们收集了他们的面部表情和皮肤电反应(GSR)数据,以及他们对文章来源和内容可信度的自我报告感知。我们还要求参与者确定他们的政治亲和力,并评估文章的政治基调,以深入了解政治倾向与文章感知之间的关系。我们的研究结果表明,2019年5月发布的OpenAI GPT-2模型生成的文章有近一半的时间被错误识别为人类撰写的文章,而人类撰写的文章有大约70%的时间被正确识别为人类撰写的文章。
{"title":"Perceptions of Human and Machine-Generated Articles","authors":"Shubhra Tewari, Renos Zabounidis, Ammina Kothari, Reynold J. Bailey, Cecilia Ovesdotter Alm","doi":"10.1145/3428158","DOIUrl":"https://doi.org/10.1145/3428158","url":null,"abstract":"Automated journalism technology is transforming news production and changing how audiences perceive the news. As automated text-generation models advance, it is important to understand how readers perceive human-written and machine-generated content. This study used OpenAI’s GPT-2 text-generation model (May 2019 release) and articles from news organizations across the political spectrum to study participants’ reactions to human- and machine-generated articles. As participants read the articles, we collected their facial expression and galvanic skin response (GSR) data together with self-reported perceptions of article source and content credibility. We also asked participants to identify their political affinity and assess the articles’ political tone to gain insight into the relationship between political leaning and article perception. Our results indicate that the May 2019 release of OpenAI’s GPT-2 model generated articles that were misidentified as written by a human close to half the time, while human-written articles were identified correctly as written by a human about 70 percent of the time.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123783690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The County Fair Cyber Loss Distribution 县公平网络损失分配
Pub Date : 2021-04-15 DOI: 10.1145/3434403
Daniel W. Woods, Tyler Moore, A. Simpson
Insurance premiums reflect expectations about the future losses of each insured. Given the dearth of cyber security loss data, market premiums could shed light on the true magnitude of cyber losses despite noise from factors unrelated to losses. To that end, we extract cyber insurance pricing information from the regulatory filings of 26 insurers. We provide empirical observations on how premiums vary by coverage type, amount, and policyholder type and over time. A method using particle swarm optimisation and the expected value premium principle is introduced to iterate through candidate parameterised distributions with the goal of reducing error in predicting observed prices. We then aggregate the inferred loss models across 6,828 observed prices from all 26 insurers to derive the County Fair Cyber Loss Distribution. We demonstrate its value in decision support by applying it to a theoretical retail firm with annual revenue of $50M. The results suggest that the expected cyber liability loss is $428K and that the firm faces a 2.3% chance of experiencing a cyber liability loss between $100K and $10M each year. The method and resulting estimates could help organisations better manage cyber risk, regardless of whether they purchase insurance.
保险费反映了对每个被保险人未来损失的预期。鉴于缺乏网络安全损失数据,尽管与损失无关的因素会产生噪音,但市场溢价可能会揭示网络损失的真实规模。为此,我们从26家保险公司的监管文件中提取网络保险定价信息。我们提供了关于保费如何随保险类型、金额、投保人类型和时间而变化的经验观察。采用粒子群优化和期望值溢价原理对候选参数化分布进行迭代,以减少预测观测价格的误差。然后,我们从所有26家保险公司的6,828个观察价格中汇总推断的损失模型,以得出县公平网络损失分布。我们通过将其应用于一家年收入为5000万美元的理论零售公司来证明其在决策支持中的价值。结果表明,预期的网络责任损失为42.8万美元,公司每年面临10万至1000万美元网络责任损失的可能性为2.3%。该方法和由此产生的估计可以帮助企业更好地管理网络风险,无论他们是否购买保险。
{"title":"The County Fair Cyber Loss Distribution","authors":"Daniel W. Woods, Tyler Moore, A. Simpson","doi":"10.1145/3434403","DOIUrl":"https://doi.org/10.1145/3434403","url":null,"abstract":"Insurance premiums reflect expectations about the future losses of each insured. Given the dearth of cyber security loss data, market premiums could shed light on the true magnitude of cyber losses despite noise from factors unrelated to losses. To that end, we extract cyber insurance pricing information from the regulatory filings of 26 insurers. We provide empirical observations on how premiums vary by coverage type, amount, and policyholder type and over time. A method using particle swarm optimisation and the expected value premium principle is introduced to iterate through candidate parameterised distributions with the goal of reducing error in predicting observed prices. We then aggregate the inferred loss models across 6,828 observed prices from all 26 insurers to derive the County Fair Cyber Loss Distribution. We demonstrate its value in decision support by applying it to a theoretical retail firm with annual revenue of $50M. The results suggest that the expected cyber liability loss is $428K and that the firm faces a 2.3% chance of experiencing a cyber liability loss between $100K and $10M each year. The method and resulting estimates could help organisations better manage cyber risk, regardless of whether they purchase insurance.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124516578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fake News Sharing 假新闻分享
Pub Date : 2021-04-15 DOI: 10.1145/3410025
Rohit Valecha, San Antonio, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, Hazel Kwon, Rohit Valecha, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, K. Kwon, M. Agrawal
Fake news has become a growing problem for societies, spreading virally and transforming into harmful impacts in social networks. The problem of fake news is even more troubling in the healthcare context. In the healthcare literature, it has been well established that threat situations and coping responses facilitate information sharing and seeking among the public. Along a similar vein, we argue that threat and coping related cues are important indicators of shareworthiness of fake news in social media. We address the following research questions associated with fake news sharing in the context of Zika virus: How do threat- and coping-related cues influence fake news sharing? We characterize threat situations that have threat and severity cues and coping responses that are based on reaction to protection and fear cues. The results indicate the significant positive effect of threat cues and protection cues on fake news sharing. Such an investigation can allow the monitoring of viral fake messages in a timely manner.
假新闻已经成为社会日益严重的问题,病毒式传播并在社交网络中转化为有害影响。在医疗保健领域,假新闻的问题甚至更令人不安。在医疗文献中,已经很好地建立了威胁情况和应对反应促进信息共享和公众之间的寻求。同样,我们认为威胁和应对相关线索是假新闻在社交媒体上可分享性的重要指标。在寨卡病毒的背景下,我们解决了以下与假新闻分享相关的研究问题:威胁和应对相关的线索如何影响假新闻分享?我们描述了具有威胁和严重性线索的威胁情境,以及基于对保护和恐惧线索的反应的应对反应。结果表明,威胁线索和保护线索对虚假新闻分享有显著的正向影响。这样的调查可以让病毒假消息的监测及时。
{"title":"Fake News Sharing","authors":"Rohit Valecha, San Antonio, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, Hazel Kwon, Rohit Valecha, Srikrishna Krishnarao Srinivasan, Tejaswi Volety, K. Kwon, M. Agrawal","doi":"10.1145/3410025","DOIUrl":"https://doi.org/10.1145/3410025","url":null,"abstract":"Fake news has become a growing problem for societies, spreading virally and transforming into harmful impacts in social networks. The problem of fake news is even more troubling in the healthcare context. In the healthcare literature, it has been well established that threat situations and coping responses facilitate information sharing and seeking among the public. Along a similar vein, we argue that threat and coping related cues are important indicators of shareworthiness of fake news in social media. We address the following research questions associated with fake news sharing in the context of Zika virus: How do threat- and coping-related cues influence fake news sharing? We characterize threat situations that have threat and severity cues and coping responses that are based on reaction to protection and fear cues. The results indicate the significant positive effect of threat cues and protection cues on fake news sharing. Such an investigation can allow the monitoring of viral fake messages in a timely manner.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116041929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Real-world Credible Experts in the Financial Domain 在金融领域识别真实世界的可信专家
Pub Date : 2021-04-15 DOI: 10.1145/3446783
Teng-Chieh Huang, Razieh Nokhbeh, Teng-Chieh Huang, Razieh Nokhbeh Zaeem
Establishing a solid mechanism for finding credible and trustworthy people in online social networks is an important first step to avoid useless, misleading, or even malicious information. There is a body of existing work studying trustworthiness of social media users and finding credible sources in specific target domains. However, most of the related work lacks the connection between the credibility in the real-world and credibility on the Internet, which makes the formation of social media credibility and trustworthiness incomplete. In this article, working in the financial domain, we identify attributes that can distinguish credible users on the Internet who are indeed trustworthy experts in the real-world. To ensure objectivity, we gather the list of credible financial experts from real-world financial authorities. We analyze the distribution of attributes of about 10K stock-related Twitter users and their 600K tweets over six months in 2015/2016, and over 2.6M typical Twitter users and their 4.8M tweets on November 2nd, 2015, comprising 1% of the entire Twitter in that time period. By using the random forest classifier, we find which attributes are related to real-world expertise. Our work sheds light on the properties of trustworthy users and paves the way for their automatic identification.
建立一个可靠的机制,在在线社交网络中寻找可信和值得信赖的人,是避免无用、误导甚至恶意信息的重要第一步。目前已有大量工作在研究社交媒体用户的可信度,并在特定目标领域寻找可信的信息来源。然而,大多数相关工作缺乏将现实世界中的可信度与网络上的可信度联系起来,这使得社交媒体可信度和可信度的形成不完整。在这篇研究金融领域的文章中,我们确定了可以区分互联网上可信用户的属性,这些用户在现实世界中确实是值得信赖的专家。为了确保客观性,我们从现实世界的金融当局中收集了可靠的金融专家名单。我们分析了2015/2016年6个月内约1万名股票相关Twitter用户及其60万条推文的属性分布,以及2015年11月2日超过260万名典型Twitter用户及其480万条推文的属性分布,占该时间段整个Twitter的1%。通过使用随机森林分类器,我们发现哪些属性与现实世界的专业知识相关。我们的工作揭示了值得信赖的用户的属性,并为他们的自动识别铺平了道路。
{"title":"Identifying Real-world Credible Experts in the Financial Domain","authors":"Teng-Chieh Huang, Razieh Nokhbeh, Teng-Chieh Huang, Razieh Nokhbeh Zaeem","doi":"10.1145/3446783","DOIUrl":"https://doi.org/10.1145/3446783","url":null,"abstract":"Establishing a solid mechanism for finding credible and trustworthy people in online social networks is an important first step to avoid useless, misleading, or even malicious information. There is a body of existing work studying trustworthiness of social media users and finding credible sources in specific target domains. However, most of the related work lacks the connection between the credibility in the real-world and credibility on the Internet, which makes the formation of social media credibility and trustworthiness incomplete. In this article, working in the financial domain, we identify attributes that can distinguish credible users on the Internet who are indeed trustworthy experts in the real-world. To ensure objectivity, we gather the list of credible financial experts from real-world financial authorities. We analyze the distribution of attributes of about 10K stock-related Twitter users and their 600K tweets over six months in 2015/2016, and over 2.6M typical Twitter users and their 4.8M tweets on November 2nd, 2015, comprising 1% of the entire Twitter in that time period. By using the random forest classifier, we find which attributes are related to real-world expertise. Our work sheds light on the properties of trustworthy users and paves the way for their automatic identification.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121303324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Automated Factchecking 走向自动化事实核查
Pub Date : 2021-04-15 DOI: 10.1145/3412869
Lev Konstantinovskiy, Oliver Price, Mevan Babakar, A. Zubiaga
In an effort to assist factcheckers in the process of factchecking, we tackle the claim detection task, one of the necessary stages prior to determining the veracity of a claim. It consists of identifying the set of sentences, out of a long text, deemed capable of being factchecked. This article is a collaborative work between Full Fact, an independent factchecking charity, and academic partners. Leveraging the expertise of professional factcheckers, we develop an annotation schema and a benchmark for automated claim detection that is more consistent across time, topics, and annotators than are previous approaches. Our annotation schema has been used to crowdsource the annotation of a dataset with sentences from UK political TV shows. We introduce an approach based on universal sentence representations to perform the classification, achieving an F1 score of 0.83, with over 5% relative improvement over the state-of-the-art methods ClaimBuster and ClaimRank. The system was deployed in production and received positive user feedback.
为了协助事实核查人员进行事实核查,我们处理索赔检测任务,这是确定索赔真实性之前的必要阶段之一。它包括从长文本中识别出一组句子,这些句子被认为能够被核实事实。本文由独立的事实核查慈善机构Full Fact和学术合作伙伴共同完成。利用专业事实检查人员的专业知识,我们为自动索赔检测开发了一个注释模式和基准,它比以前的方法在时间、主题和注释者之间更加一致。我们的注释模式已经被用于众包一个数据集的注释,其中包含英国政治电视节目中的句子。我们引入了一种基于通用句子表示的方法来执行分类,获得了0.83的F1分数,比最先进的方法ClaimBuster和ClaimRank相对提高了5%以上。该系统已投入生产,并获得了积极的用户反馈。
{"title":"Toward Automated Factchecking","authors":"Lev Konstantinovskiy, Oliver Price, Mevan Babakar, A. Zubiaga","doi":"10.1145/3412869","DOIUrl":"https://doi.org/10.1145/3412869","url":null,"abstract":"In an effort to assist factcheckers in the process of factchecking, we tackle the claim detection task, one of the necessary stages prior to determining the veracity of a claim. It consists of identifying the set of sentences, out of a long text, deemed capable of being factchecked. This article is a collaborative work between Full Fact, an independent factchecking charity, and academic partners. Leveraging the expertise of professional factcheckers, we develop an annotation schema and a benchmark for automated claim detection that is more consistent across time, topics, and annotators than are previous approaches. Our annotation schema has been used to crowdsource the annotation of a dataset with sentences from UK political TV shows. We introduce an approach based on universal sentence representations to perform the classification, achieving an F1 score of 0.83, with over 5% relative improvement over the state-of-the-art methods ClaimBuster and ClaimRank. The system was deployed in production and received positive user feedback.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125906429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
Digital Threats: Research and Practice
全部 Geobiology Appl. Clay Sci. Geochim. Cosmochim. Acta J. Hydrol. Org. Geochem. Carbon Balance Manage. Contrib. Mineral. Petrol. Int. J. Biometeorol. IZV-PHYS SOLID EART+ J. Atmos. Chem. Acta Oceanolog. Sin. Acta Geophys. ACTA GEOL POL ACTA PETROL SIN ACTA GEOL SIN-ENGL AAPG Bull. Acta Geochimica Adv. Atmos. Sci. Adv. Meteorol. Am. J. Phys. Anthropol. Am. J. Sci. Am. Mineral. Annu. Rev. Earth Planet. Sci. Appl. Geochem. Aquat. Geochem. Ann. Glaciol. Archaeol. Anthropol. Sci. ARCHAEOMETRY ARCT ANTARCT ALP RES Asia-Pac. J. Atmos. Sci. ATMOSPHERE-BASEL Atmos. Res. Aust. J. Earth Sci. Atmos. Chem. Phys. Atmos. Meas. Tech. Basin Res. Big Earth Data BIOGEOSCIENCES Geostand. Geoanal. Res. GEOLOGY Geosci. J. Geochem. J. Geochem. Trans. Geosci. Front. Geol. Ore Deposits Global Biogeochem. Cycles Gondwana Res. Geochem. Int. Geol. J. Geophys. Prospect. Geosci. Model Dev. GEOL BELG GROUNDWATER Hydrogeol. J. Hydrol. Earth Syst. Sci. Hydrol. Processes Int. J. Climatol. Int. J. Earth Sci. Int. Geol. Rev. Int. J. Disaster Risk Reduct. Int. J. Geomech. Int. J. Geog. Inf. Sci. Isl. Arc J. Afr. Earth. Sci. J. Adv. Model. Earth Syst. J APPL METEOROL CLIM J. Atmos. Oceanic Technol. J. Atmos. Sol. Terr. Phys. J. Clim. J. Earth Sci. J. Earth Syst. Sci. J. Environ. Eng. Geophys. J. Geog. Sci. Mineral. Mag. Miner. Deposita Mon. Weather Rev. Nat. Hazards Earth Syst. Sci. Nat. Clim. Change Nat. Geosci. Ocean Dyn. Ocean and Coastal Research npj Clim. Atmos. Sci. Ocean Modell. Ocean Sci. Ore Geol. Rev. OCEAN SCI J Paleontol. J. PALAEOGEOGR PALAEOCL PERIOD MINERAL PETROLOGY+ Phys. Chem. Miner. Polar Sci. Prog. Oceanogr. Quat. Sci. Rev. Q. J. Eng. Geol. Hydrogeol. RADIOCARBON Pure Appl. Geophys. Resour. Geol. Rev. Geophys. Sediment. Geol.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1