Stealing Reality: When Criminals Become Data Scientists

نویسندگان

  • Yaniv Altshuler
  • Nadav Aharony
  • Yuval Elovici
  • Alex Pentland
  • Manuel Cebrian
چکیده

Yaniv Altshuler,1, 2 Nadav Aharony,1 Yuval Elovici,2, 3 Alex Pentland,1 and Manuel Cebrian1, 4 The Media Laboratory, Massachusetts Institute of Technology, Cambridge, MA 02139, USA Deutsche Telekom Laboratories, Ben Gurion University, Beer Sheva 84105, Israel Department of Information Systems Engineering, Ben Gurion University, Beer Sheva 84105, Israel Department of Computer Science and Engineering, University of California San Diego, La Jolla, CA 92093

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stealing Reality

In this paper we discuss the threat of malware targeted at extracting information about the relationships in a real-world social network as well as characteristic information about the individuals in the network, which we dub Stealing Reality. We present Stealing Reality (SR), explain why it differs from traditional types of network attacks, and discuss why its impact is significantly more dang...

متن کامل

Integrated care cannot flourish with broken windows

The theory of the broken windows can explain much of the low incidence of integrated care. This theory of the criminologists (Kelling and Coles w3x) states that the incidence of crime depends more on the context than on personal characteristics of the criminal such as sex, age, race, education and cultural background. The theory got its name from the metaphor of a house with one broken window. ...

متن کامل

Early Phishing

The history of phishing traces back in important ways to the mid-1990s when hacking software facilitated the mass targeting of people in password stealing scams on America Online (AOL). The first of these software programs was mine, called AOHell, and it was where the word phishing was coined. The software provided an automated password and credit card-stealing mechanism starting in January 199...

متن کامل

Achieving Efficient Work-Stealing for Data-Parallel Collections

In modern programming high-level data-structures are an important foundation for most applications. With the rise of the multicore era, there is a growing trend of supporting data-parallel collection operations in general purpose programming languages and platforms. To facilitate object-oriented reuse these operations are highly parametric, incurring abstraction performance penalties. Furthermo...

متن کامل

Old Wine in New Bottles: Investigating how Information Technology is Enabling "Old Criminals" to access "New Venues"

The purpose of this panel it is to evoke a discussion that examines how cybercriminals translate methods for stealing data, identities, and money from individuals and organizations from the face-to-face world to an information technology (IT) enabled environment. Specifically, this panel will: 1) give members of the audience an opportunity to learn about contemporary theories of the psychology ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012