Security and Privacy
Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleSeptember 2024
Fake News and Hate Speech - Evidence from Germany
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 282–287https://doi.org/10.1145/3670243.3677383Hate crimes against politicians have become a contentious topic in German media and public discussion. At the same time there is little empirical evidence on how big the phenomena are in the digital media and how the digital media and the real world are ...
- research-articleSeptember 2024
Enhancing Cybersecurity Awareness and Education
- Celina Junghans,
- Gerald Quirchmayr,
- Thomas Schaberreiter,
- Martin Kandlhofer,
- Ronald Bieber,
- Jerry Andriessen,
- Mirjam Pardijs
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 240–246https://doi.org/10.1145/3670243.3673883As the digitization of our life continuously progresses, the associated risks and their impacts on each individual user of digital applications and internet services also continue to increase. Cybercriminals specifically exploit the carelessness or ...
- research-articleSeptember 2024
Proactive Curriculum for Cyber Security Education: A Model of Micro-Credentials and Active Blended Learning
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 234–239https://doi.org/10.1145/3670243.3673882The landscape of cyber-attacks is rapidly evolving and increasing in variety and frequency. The demand for cyber security expertise, coupled with a shortage of qualified professionals, underscores the urgent need for comprehensive training programs and ...
- research-articleSeptember 2024
SMART AND DIGITAL HEALTHCARE. ADVANCED TECHNOLOGIES AND SECURITY ISSUES
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 288–294https://doi.org/10.1145/3670243.3673857Smart and Digital healthcare is governed by ICT (Information and Communication Technology) and uses interconnected devices through communication networks to manage medical data, monitor patient status, manage hospitals and interact with government ...
- research-articleSeptember 2024
The relationship between generative artificial intelligence and cybersecurity
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 209–215https://doi.org/10.1145/3670243.3670781This research paper investigates the adoption of generative artificial intelligence by citizens using the Technology Adoption Propensity (TAP) index. The study aims to explore the influence of cybersecurity factors on the acceptance of generative ...
- research-articleSeptember 2024
The current state and challenges of the cybersecurity legal framework in the context of EU financial entities
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 203–208https://doi.org/10.1145/3670243.3670779In the current context of digitalization and globalization, development is an evolving, dynamic process. As with any change, the rise of digitalization and its role in human life can have both positive and negative consequences. The expanded cyber space ...
- research-articleSeptember 2024
The relationship between the dark triad personality and cybersecurity
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 195–202https://doi.org/10.1145/3670243.3670262The current study endeavors to explore the linkages between the Dark Triad personality traits, namely narcissism, Machiavellianism, and psychopathy, and the attitudes towards cybersecurity among university students who are registered in an information ...
- research-articleSeptember 2024
Measuring Impact on Confidence in Institutions by their Use of Software Components
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 119–124https://doi.org/10.1145/3670243.3670249We report on the design of a study to measure how the introduction of middleware software components could impact confidence in an institution. Middleware is software that runs in the background and thus cannot be perceived directly by end-users of ...
- research-articleSeptember 2024
Implementing mandatory e-invoices B2B in Germany - Issues Obstacles and probable Showstoppers
CEEeGov '24: Proceedings of the Central and Eastern European eDem and eGov Days 2024September 2024, Pages 38–41https://doi.org/10.1145/3670243.3670246According to recent legislation e-invoices will, with some time lag, be mandatory for B2B transactions in Germany from January 1, 2025. Such e-invoices must, above all, fulfill three major requirements: the issuer of the e-invoice must be identified and ...
- research-articleSeptember 2024
On the Use of Heterogeneous Graph Neural Networks for Detecting Malicious Activities: a Case Study with Cryptocurrencies
OASIS '24: Proceedings of the 4th International Workshop on Open Challenges in Online Social NetworksSeptember 2024, Pages 33–40https://doi.org/10.1145/3677117.3685009This paper presents a study on the application of Heterogeneous Graph Neural Networks (HGNNs) for enhancing the security of complex social systems by identifying illicit and malicious behaviors. We focus on digital asset tokenization, a key component in ...
- research-articleSeptember 2024
Digital Junkfood on Social Media: To Each Their Own Poison
HT '24: Proceedings of the 35th ACM Conference on Hypertext and Social MediaSeptember 2024, Pages 126–135https://doi.org/10.1145/3648188.3678163Social media platforms are designed in a way that keeps users engaged and occupied for as long as possible, by means of various user interface design elements and personalization techniques. A known problem with these techniques is that they may cause ...
- research-articleSeptember 2024
Unveiling Coyote Ads: Detecting Human Smuggling Advertisements on Social Media
HT '24: Proceedings of the 35th ACM Conference on Hypertext and Social MediaSeptember 2024, Pages 259–272https://doi.org/10.1145/3648188.3675139Human smuggling is a grave social issue that carries several negative ramifications for many countries across the globe. Human smugglers operating on the United States-Mexico border, known as ‘coyotes’, are increasingly relying on online social media to ...
- research-articleSeptember 2024
Framekernel: A Safe and Efficient Kernel Architecture via Rust-based Intra-kernel Privilege Separation
APSys '24: Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on SystemsSeptember 2024, Pages 31–37https://doi.org/10.1145/3678015.3680492This paper introduces the framekernel architecture, a novel approach to operating system (OS) design that utilizes safe language-based, intra-kernel privilege separation. This architecture combines the security advantages of microkernels with the ...
- research-articleSeptember 2024
Designing and Implementing Live Migration Support for Arm-based Confidential VMs
APSys '24: Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on SystemsSeptember 2024, Pages 53–59https://doi.org/10.1145/3678015.3680488Confidential virtual machines (CVMs) are increasingly deployed to protect users' code and data in use against attackers with hypervisor privileges. Given Arm's growing adoption, various implementations have extended commodity hypervisors like KVM to ...
- research-articleSeptember 2024
Hora: High Assurance Periodic Availability Guarantee for Life-Critical Applications on Smartphones
APSys '24: Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on SystemsSeptember 2024, Pages 115–121https://doi.org/10.1145/3678015.3680486Body-worn medical devices benefit from having a companion mobile application to monitor them and even program them. For example, the companion application for an insulin pump can be used to automatically monitor blood sugar level throughout the day and ...
- research-articleSeptember 2024
Chaos: Function Granularity Runtime Address Layout Space Randomization for Kernel Module
- Zihao Chang,
- Jihan Lin,
- Haifeng Sun,
- Runkuang Li,
- Ying Wang,
- Bin Hu,
- Xiaofang Zhao,
- Dejun Jiang,
- Ninghui Sun,
- Sa Wang
APSys '24: Proceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on SystemsSeptember 2024, Pages 23–30https://doi.org/10.1145/3678015.3680476The return-oriented programming (ROP) is a prevalent code reuse attack. It exploits vulnerabilities such as stack overflows to hijack the execution flow into the carefully chosen instruction snippet (called gadget) chain already in the memory. Address ...
- research-articleSeptember 2024
Sustainable Certification of Local Communities Data through Smart Contracts
GoodIT '24: Proceedings of the 2024 International Conference on Information Technology for Social GoodSeptember 2024, Pages 420–428https://doi.org/10.1145/3677525.3678692Local communities engage production systems based on a set of agreed quality standards to which each member must adhere. Most of these systems, from local food production to renewable energy communities, require continuous and transparent monitoring of ...
- research-articleSeptember 2024
AAA: A blockchain-based architecture for ethical, robust authenticated anonymity
GoodIT '24: Proceedings of the 2024 International Conference on Information Technology for Social GoodSeptember 2024, Page 1https://doi.org/10.1145/3677525.3678676In the past years, online anonymity has attracted strong criticism for its role in shielding online crimes such as cyberbullying, fake news, money laundering, and pedo-pornography. Yet, it also has historically strong supporters who emphasize the ...
- research-articleSeptember 2024
Commit-Chains Without Smart Contracts for Blockchain Applications in Local Communities
GoodIT '24: Proceedings of the 2024 International Conference on Information Technology for Social GoodSeptember 2024, Pages 216–224https://doi.org/10.1145/3677525.3678664Blockchain technology’s scalability is a major challenge that hampers its adoption and utility, particularly in resource-constrained local communities. In this paper, we present TokenCards 1, a novel commit-chain tailored to local communities.
Our Layer ...
- extended-abstractSeptember 2024
Exploring Regulatory Sandboxes: Safeguarding AI-Based Software for Minors
GoodIT '24: Proceedings of the 2024 International Conference on Information Technology for Social GoodSeptember 2024, Pages 158–162https://doi.org/10.1145/3677525.3678656The online safety of minors is a complex issue that legislators are striving to address. Numerous initiatives aim to define policies and best practices to mitigate the risks associated with the use of technologies and applications by young individuals, ...