首页 > 最新文献

2015 IEEE International Conference on Intelligence and Security Informatics (ISI)最新文献

英文 中文
Honeypot based unauthorized data access detection in MapReduce systems MapReduce系统中基于蜜罐的非授权数据访问检测
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165951
Huseyin Ulusoy, Murat Kantarcioglu, B. Thuraisingham, L. Khan
The data processing capabilities of MapReduce systems pioneered with the on-demand scalability of cloud computing have enabled the Big Data revolution. However, the data controllers/owners worried about the privacy and accountability impact of storing their data in the cloud infrastructures as the existing cloud computing solutions provide very limited control on the underlying systems. The intuitive approach - encrypting data before uploading to the cloud - is not applicable to MapReduce computation as the data analytics tasks are ad-hoc defined in the MapReduce environment using general programming languages (e.g, Java) and homomorphic encryption methods that can scale to big data do not exist. In this paper, we address the challenges of determining and detecting unauthorized access to data stored in MapReduce based cloud environments. To this end, we introduce alarm raising honeypots distributed over the data that are not accessed by the authorized MapReduce jobs, but only by the attackers and/or unauthorized users. Our analysis shows that unauthorized data accesses can be detected with reasonable performance in MapReduce based cloud environments.
MapReduce系统的数据处理能力与云计算的按需可扩展性一起开创了大数据革命。然而,数据控制者/所有者担心将数据存储在云基础设施中的隐私和问责制影响,因为现有的云计算解决方案对底层系统的控制非常有限。直观的方法——在上传到云端之前对数据进行加密——并不适用于MapReduce计算,因为数据分析任务是在MapReduce环境中使用通用编程语言(例如Java)特别定义的,并且不存在可以扩展到大数据的同态加密方法。在本文中,我们解决了确定和检测对存储在基于MapReduce的云环境中的数据的未经授权访问的挑战。为此,我们引入了报警蜜罐,这些蜜罐分布在未被授权的MapReduce作业访问,而只有攻击者和/或未经授权的用户访问的数据上。我们的分析表明,在基于MapReduce的云环境中,可以以合理的性能检测未经授权的数据访问。
{"title":"Honeypot based unauthorized data access detection in MapReduce systems","authors":"Huseyin Ulusoy, Murat Kantarcioglu, B. Thuraisingham, L. Khan","doi":"10.1109/ISI.2015.7165951","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165951","url":null,"abstract":"The data processing capabilities of MapReduce systems pioneered with the on-demand scalability of cloud computing have enabled the Big Data revolution. However, the data controllers/owners worried about the privacy and accountability impact of storing their data in the cloud infrastructures as the existing cloud computing solutions provide very limited control on the underlying systems. The intuitive approach - encrypting data before uploading to the cloud - is not applicable to MapReduce computation as the data analytics tasks are ad-hoc defined in the MapReduce environment using general programming languages (e.g, Java) and homomorphic encryption methods that can scale to big data do not exist. In this paper, we address the challenges of determining and detecting unauthorized access to data stored in MapReduce based cloud environments. To this end, we introduce alarm raising honeypots distributed over the data that are not accessed by the authorized MapReduce jobs, but only by the attackers and/or unauthorized users. Our analysis shows that unauthorized data accesses can be detected with reasonable performance in MapReduce based cloud environments.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A statistical study of covert timing channels using network packet frequency 基于网络包频率的隐蔽定时信道的统计研究
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165963
Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li
This paper first reviews covert timing channels with network packet frequencies as information carriers. Then, based on the study of communication and statistical models, it proposes a method to detect an enhanced covert timing channel and its use of carrier frequencies. With the help of MATLAB for simulation, several experiments have been conducted for the verification of the proposed method.
本文首先综述了以网络分组频率为信息载体的隐蔽定时信道。然后,在研究通信和统计模型的基础上,提出了一种检测增强隐蔽定时信道及其载波频率的方法。利用MATLAB进行仿真,并进行了多次实验验证所提方法的有效性。
{"title":"A statistical study of covert timing channels using network packet frequency","authors":"Fangyue Chen, Yunke Wang, Heng Song, Xiangyang Li","doi":"10.1109/ISI.2015.7165963","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165963","url":null,"abstract":"This paper first reviews covert timing channels with network packet frequencies as information carriers. Then, based on the study of communication and statistical models, it proposes a method to detect an enhanced covert timing channel and its use of carrier frequencies. With the help of MATLAB for simulation, several experiments have been conducted for the verification of the proposed method.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126135303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring hacker assets in underground forums 在地下论坛中探索黑客资产
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165935
S. Samtani, Ryan Chinn, Hsinchun Chen
Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.
如今,许多大公司都面临着通过恶意软件泄露数据的风险,从而危及其业务。这些类型的攻击通常是使用黑客资产执行的。研究地下社区中的黑客资产可以帮助识别可能用于网络攻击的工具,提供如何实施和使用这些资产的知识,并协助以有利于道德重用和教育的方式组织工具。本研究旨在运用分类与主题建模技术,了解黑客论坛中资产的功能与特征。这项研究通过深入了解知名论坛上的黑客资产,并以有利于教育重用的方式组织它们,为黑客文献做出了贡献。此外,公司可以将我们的框架应用于他们选择的论坛,以提取他们的资产和适当的功能。
{"title":"Exploring hacker assets in underground forums","authors":"S. Samtani, Ryan Chinn, Hsinchun Chen","doi":"10.1109/ISI.2015.7165935","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165935","url":null,"abstract":"Many large companies today face the risk of data breaches via malicious software, compromising their business. These types of attacks are usually executed using hacker assets. Researching hacker assets within underground communities can help identify the tools which may be used in a cyberattack, provide knowledge on how to implement and use such assets and assist in organizing tools in a manner conducive to ethical reuse and education. This study aims to understand the functions and characteristics of assets in hacker forums by applying classification and topic modeling techniques. This research contributes to hacker literature by gaining a deeper understanding of hacker assets in well-known forums and organizing them in a fashion conducive to educational reuse. Additionally, companies can apply our framework to forums of their choosing to extract their assets and appropriate functions.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 74
Analysis of criminal social networks with typed and directed edges 带类型边和有向边的犯罪社会网络分析
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165930
Q. Zheng, D. Skillicorn
The relationships within criminal groups are of qualitatively different kinds, and are typically not symmetric because of issues of power and influence. Social network analysis techniques have not been able to model this richness of relationships well. We develop a new technique for spectral embedding of directed graphs, and combine it with a recently developed technique for spectral embedding of graphs with typed edges. We use the combination to model two 'Ndrangheta organized crime groups, and show that structure that is otherwise not visible can be extracted.
犯罪集团内部的关系在性质上是不同的,而且由于权力和影响力的问题,通常不是对称的。社会网络分析技术还不能很好地模拟这种丰富的关系。本文提出了一种新的有向图的谱嵌入技术,并将其与最近发展起来的带类型边图的谱嵌入技术相结合。我们用这个组合来模拟两个“Ndrangheta”有组织犯罪集团,并展示了不可见的结构可以被提取出来。
{"title":"Analysis of criminal social networks with typed and directed edges","authors":"Q. Zheng, D. Skillicorn","doi":"10.1109/ISI.2015.7165930","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165930","url":null,"abstract":"The relationships within criminal groups are of qualitatively different kinds, and are typically not symmetric because of issues of power and influence. Social network analysis techniques have not been able to model this richness of relationships well. We develop a new technique for spectral embedding of directed graphs, and combine it with a recently developed technique for spectral embedding of graphs with typed edges. We use the combination to model two 'Ndrangheta organized crime groups, and show that structure that is otherwise not visible can be extracted.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Unintentional bugs to vulnerability mapping in Android applications Android应用程序中的无意bug到漏洞映射
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165966
Garima Bajwa, M. Fazeen, R. Dantu, Sonal Tanpure
The intention of an Android application, determined by the source code analysis is used to identify potential maliciousness in that application (app). Similarly, it is possible to analyze the unintentional behaviors of an app to identify and reduce the window of vulnerabilities. Unintentional behaviors of an app can be any developmental loopholes such as software bugs overlooked by a developer or introduced by an adversary intentionally. FindBugsTM and Android Lint are a couple of tools that can detect such bugs easily. A software bug can cause many security vulnerabilities (known or unknown) and vice-versa, thus, creating a many-to-many mapping. In our approach, we construct a matrix of mapping between the bugs and the potential vulnerabilities. A software bug detection tool is used to identify a list of bugs and create an empirical list of the vulnerabilities in an app. The many-to-many mapping matrix is obtained by two approaches - severity mapping and probability mapping. These mappings can be used as tools to measure the unknown vulnerabilities and their strength. We believe our study is the first of its kind and it can enhance the security of Android apps in their development phase itself. Also, the reverse mapping matrix (vulnerabilities to bugs) could be used to improve the accuracy of malware detection in Android apps.
Android应用程序的意图,由源代码分析确定,用于识别该应用程序(应用程序)中的潜在恶意。同样,可以分析应用程序的无意行为来识别和减少漏洞窗口。应用的无意行为可能是任何开发漏洞,如开发者忽视的软件漏洞或对手故意引入的漏洞。FindBugsTM和Android Lint是两个可以轻松检测此类错误的工具。软件缺陷可能导致许多安全漏洞(已知的或未知的),反之亦然,从而创建多对多映射。在我们的方法中,我们构建了错误和潜在漏洞之间的映射矩阵。利用软件漏洞检测工具识别漏洞列表,创建应用程序漏洞的经验列表。多对多映射矩阵通过严重性映射和概率映射两种方法获得。这些映射可以用作衡量未知漏洞及其强度的工具。我们相信我们的研究是第一个这样的研究,它可以提高Android应用程序在开发阶段的安全性。此外,反向映射矩阵(漏洞到bug)可以用来提高Android应用中恶意软件检测的准确性。
{"title":"Unintentional bugs to vulnerability mapping in Android applications","authors":"Garima Bajwa, M. Fazeen, R. Dantu, Sonal Tanpure","doi":"10.1109/ISI.2015.7165966","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165966","url":null,"abstract":"The intention of an Android application, determined by the source code analysis is used to identify potential maliciousness in that application (app). Similarly, it is possible to analyze the unintentional behaviors of an app to identify and reduce the window of vulnerabilities. Unintentional behaviors of an app can be any developmental loopholes such as software bugs overlooked by a developer or introduced by an adversary intentionally. FindBugsTM and Android Lint are a couple of tools that can detect such bugs easily. A software bug can cause many security vulnerabilities (known or unknown) and vice-versa, thus, creating a many-to-many mapping. In our approach, we construct a matrix of mapping between the bugs and the potential vulnerabilities. A software bug detection tool is used to identify a list of bugs and create an empirical list of the vulnerabilities in an app. The many-to-many mapping matrix is obtained by two approaches - severity mapping and probability mapping. These mappings can be used as tools to measure the unknown vulnerabilities and their strength. We believe our study is the first of its kind and it can enhance the security of Android apps in their development phase itself. Also, the reverse mapping matrix (vulnerabilities to bugs) could be used to improve the accuracy of malware detection in Android apps.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127890525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of financial statement fraud: Is accrual really useful as an early warning indicator? 财务报表舞弊的发现:权责发生制作为预警指标真的有用吗?
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165971
N. Oshiro
This paper provides the first evidence, using listed Japanese companies, that information in accruals has become more helpful as an early warning indicator of Financial Statement Fraud when they are appropriately preprocessed.
本文以日本上市公司为例,首次证明应计项目中的信息在经过适当预处理后,作为财务报表舞弊的预警指标更有帮助。
{"title":"Detection of financial statement fraud: Is accrual really useful as an early warning indicator?","authors":"N. Oshiro","doi":"10.1109/ISI.2015.7165971","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165971","url":null,"abstract":"This paper provides the first evidence, using listed Japanese companies, that information in accruals has become more helpful as an early warning indicator of Financial Statement Fraud when they are appropriately preprocessed.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multivariate embedding based causaltiy detection with short time series 基于多元嵌入的短时间序列因果关系检测
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165954
Chuan Luo, D. Zeng
Existing causal inference methods for social media usually rely on limited explicit causal context, preassume certain user interaction model, or neglect the nonlinear nature of social interaction, which could lead to bias estimations of causality. Besides, they often require sufficiently long time series to achieve reasonable results. Here we propose to take advantage of multivariate embedding to perform causality detection in social media. Experimental results show the efficacy of the proposed approach in causality detection and user behavior prediction in social media.
现有的社交媒体因果推理方法往往依赖于有限的显性因果语境,预设了一定的用户交互模型,或者忽视了社交互动的非线性,导致因果关系的估计存在偏差。此外,它们通常需要足够长的时间序列才能获得合理的结果。在这里,我们提出利用多元嵌入来进行社交媒体的因果关系检测。实验结果表明了该方法在社交媒体因果关系检测和用户行为预测方面的有效性。
{"title":"Multivariate embedding based causaltiy detection with short time series","authors":"Chuan Luo, D. Zeng","doi":"10.1109/ISI.2015.7165954","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165954","url":null,"abstract":"Existing causal inference methods for social media usually rely on limited explicit causal context, preassume certain user interaction model, or neglect the nonlinear nature of social interaction, which could lead to bias estimations of causality. Besides, they often require sufficiently long time series to achieve reasonable results. Here we propose to take advantage of multivariate embedding to perform causality detection in social media. Experimental results show the efficacy of the proposed approach in causality detection and user behavior prediction in social media.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122013213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews 欺骗在沟通者的眼中:调查自动欺骗检测访谈中瞳孔直径的变化
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165946
J. Proudfoot, Jeffrey L. Jenkins, J. Burgoon, J. Nunamaker
Deception is pervasive, often leading to adverse consequences for individuals, organizations, and society. Information systems researchers are developing tools and evaluating sensors that can be used to augment human deception judgments. One sensor exhibiting particular promise is the eye tracker. Prior work evaluating eye trackers for deception detection has focused on the detection and interpretation of brief eye behavior variations in response to stimuli (e.g, images) or interview questions. However, research is needed to understand how eye behaviors evolve over the course of an interaction with a deception detection system. Using latent growth curve modeling, we test how pupil diameter evolves over one's interaction with a deception detection system. The results indicate that pupil diameter changes over the course of a deception detection interaction, and that these trends are indicative of deception during the interaction, regardless if incriminating target items are shown.
欺骗无处不在,常常给个人、组织和社会带来不良后果。信息系统研究人员正在开发工具和评估可用于增强人类欺骗判断的传感器。一种特别有前景的传感器是眼动仪。先前评估眼动仪检测欺骗的工作主要集中在检测和解释眼睛对刺激(如图像)或采访问题的短暂行为变化。然而,在与欺骗检测系统相互作用的过程中,眼睛的行为是如何演变的,还需要研究。使用潜在生长曲线模型,我们测试了瞳孔直径如何随着欺骗检测系统的相互作用而演变。结果表明,瞳孔直径在欺骗检测互动过程中会发生变化,而这些变化趋势表明在互动过程中存在欺骗行为,无论是否显示有罪的目标项目。
{"title":"Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews","authors":"J. Proudfoot, Jeffrey L. Jenkins, J. Burgoon, J. Nunamaker","doi":"10.1109/ISI.2015.7165946","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165946","url":null,"abstract":"Deception is pervasive, often leading to adverse consequences for individuals, organizations, and society. Information systems researchers are developing tools and evaluating sensors that can be used to augment human deception judgments. One sensor exhibiting particular promise is the eye tracker. Prior work evaluating eye trackers for deception detection has focused on the detection and interpretation of brief eye behavior variations in response to stimuli (e.g, images) or interview questions. However, research is needed to understand how eye behaviors evolve over the course of an interaction with a deception detection system. Using latent growth curve modeling, we test how pupil diameter evolves over one's interaction with a deception detection system. The results indicate that pupil diameter changes over the course of a deception detection interaction, and that these trends are indicative of deception during the interaction, regardless if incriminating target items are shown.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131736763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The relation between microfinacing and corruption by country: An analysis of an open source dataset 小额信贷与国家腐败之间的关系:一个开源数据集的分析
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165959
H. Roy, S. Kase
Examining the relation between global microlending and corruption may inform how trust and influence propogate through crowds. Building this understanding may help U.S. Army intelligence officers leverage crowds for humanitarian efforts as well as, to detect signs of adversarial influence. A dataset was created combining open source data from Kiva, a non-profit microfinancing institution, and Transparency International, a global coalition against corruption that publishes an annual Corruption Perceptions Index (CPI). The CPI was merged with Kiva microfinancing variables related to Kiva field partners. A preliminary analysis was conducted on a subset of the data in an effort to determine a near real-time microfinancing proxy for the CPI using the Kiva microfinancing data. Results suggest that when controlling for time on Kiva, the average loan size in dollars, delinquency rate, average loan size per GDP, and average time to fund loan all significantly predict CPI.
考察全球小额贷款与腐败之间的关系,可以了解信任和影响力是如何在人群中传播的。建立这种理解可能有助于美国陆军情报官员利用人群进行人道主义努力,以及发现敌对影响的迹象。我们将非营利小额信贷机构Kiva和全球反腐败联盟透明国际(Transparency International)的开源数据结合起来,创建了一个数据集,透明国际每年发布一份清廉指数(CPI)。CPI与与Kiva实地合作伙伴相关的Kiva小额融资变量合并。对数据子集进行了初步分析,试图使用Kiva小额信贷数据确定CPI的近实时小额信贷代理。结果表明,当控制Kiva的时间时,以美元计算的平均贷款规模、拖欠率、每GDP的平均贷款规模和平均贷款时间都能显著预测CPI。
{"title":"The relation between microfinacing and corruption by country: An analysis of an open source dataset","authors":"H. Roy, S. Kase","doi":"10.1109/ISI.2015.7165959","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165959","url":null,"abstract":"Examining the relation between global microlending and corruption may inform how trust and influence propogate through crowds. Building this understanding may help U.S. Army intelligence officers leverage crowds for humanitarian efforts as well as, to detect signs of adversarial influence. A dataset was created combining open source data from Kiva, a non-profit microfinancing institution, and Transparency International, a global coalition against corruption that publishes an annual Corruption Perceptions Index (CPI). The CPI was merged with Kiva microfinancing variables related to Kiva field partners. A preliminary analysis was conducted on a subset of the data in an effort to determine a near real-time microfinancing proxy for the CPI using the Kiva microfinancing data. Results suggest that when controlling for time on Kiva, the average loan size in dollars, delinquency rate, average loan size per GDP, and average time to fund loan all significantly predict CPI.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"257 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124217785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior 网络欺凌中的积极旁观行为:共情对青少年网络欺凌支持行为的影响
Pub Date : 2015-05-27 DOI: 10.1109/ISI.2015.7165962
Samuel Owusu, Lina Zhou
Cyberbullying is becoming an epidemic problem in adolescents. The accelerated diffusion of information in an online environment exposes bullying messages to a large group of bystanders who witness such incidents. However, bystanders have received much less research attention than the aggressors and victims in the cyberbullying. The current research aims to understand whether adolescents' empathy has an impact on their positive by standing behavior - cyber bullied support behavior. Drawing on related theories and models, we proposed two hypotheses about the effect of empathy. A mixture of survey questionnaire and focus group was used to test the hypotheses. The analysis results of the survey data provided support for the effect of cognitive empathy but not affective empathy. The focus group study revealed that adolescent bystanders preferred offering indirect support to the cyber bullied by reporting to adults over direct intervention. The findings highlight the important roles of empathy training as well as teacher and parent intervention in preventing and curtaining cyberbullying both within and beyond the school environments.
网络欺凌正在成为青少年中的一个流行问题。在网络环境中,信息的加速传播使欺凌信息暴露在一大群目击此类事件的旁观者面前。然而,在网络欺凌中,旁观者受到的研究关注远远少于攻击者和受害者。本研究旨在了解青少年共情是否通过站立行为-网络欺凌支持行为对其积极行为产生影响。在相关理论和模型的基础上,我们提出了两种关于共情效应的假设。采用调查问卷和焦点小组相结合的方法对假设进行检验。调查数据的分析结果支持认知共情的作用,但不支持情感共情的作用。焦点小组研究发现,青少年旁观者倾向于通过向成年人报告来间接支持网络欺凌,而不是直接干预。研究结果强调了移情训练以及教师和家长干预在预防和控制校园内外的网络欺凌方面的重要作用。
{"title":"Positive bystanding behavior in cyberbullying: The impact of empathy on adolescents' cyber bullied support behavior","authors":"Samuel Owusu, Lina Zhou","doi":"10.1109/ISI.2015.7165962","DOIUrl":"https://doi.org/10.1109/ISI.2015.7165962","url":null,"abstract":"Cyberbullying is becoming an epidemic problem in adolescents. The accelerated diffusion of information in an online environment exposes bullying messages to a large group of bystanders who witness such incidents. However, bystanders have received much less research attention than the aggressors and victims in the cyberbullying. The current research aims to understand whether adolescents' empathy has an impact on their positive by standing behavior - cyber bullied support behavior. Drawing on related theories and models, we proposed two hypotheses about the effect of empathy. A mixture of survey questionnaire and focus group was used to test the hypotheses. The analysis results of the survey data provided support for the effect of cognitive empathy but not affective empathy. The focus group study revealed that adolescent bystanders preferred offering indirect support to the cyber bullied by reporting to adults over direct intervention. The findings highlight the important roles of empathy training as well as teacher and parent intervention in preventing and curtaining cyberbullying both within and beyond the school environments.","PeriodicalId":292352,"journal":{"name":"2015 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"187 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132030236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2015 IEEE International Conference on Intelligence and Security Informatics (ISI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1