Articles

44 Items

iPad Mini Smart Case

Wikimedia CC/Ashley Pomeroy

Journal Article - Journal of Cybersecurity

Privacy Threats in Intimate Relationships

| 2020

This article provides an overview of intimate threats: a class of privacy threats that can arise within families, romantic partnerships, close friendships, and caregiving relationships. The authors survey a range of intimate relationships and describe their common features. Based on these features, they explore implications for both technical privacy design and policy, and offer design recommendations for ameliorating intimate privacy risks.

Andrew Wakefield arrives at the General Medical Council in London to face a disciplinary panel investigating allegations of serious professional misconduct.

AP

Journal Article - Science

The Science of Fake News

    Authors:
  • David Lazer
  • Matthew A Baum
  • Yochai Benkler
  • Adam J Berinsky
  • Filippo Menczer
  • Miriam J Metzger
  • Brendan Nyhan
  • Gordon Pennycook
  • David Rothschild
  • Michael Schudson
  • Steven A Sloman
  • Cass R. Sunstein
  • Emily A Thorson
  • Duncan J Watts
| Mar. 08, 2018

The rise of fake news highlights the erosion of long-standing institutional bulwarks against misinformation in the internet age. Concern over the problem is global. However, much remains unknown regarding the vulnerabilities of individuals, institutions, and society to manipulations by malicious actors. A new system of safeguards is needed.

University of Michigan Journal of Law Reform

University of Michigan Journal of Law Reform

Journal Article - University of Michigan Journal of Law Reform

Making Democracy Harder to Hack

| Spring 2017 (Volume 50, Issue 3)

With the Russian government hack of the Democratic National Convention email servers and related leaks, the drama of the 2016 U.S. presidential race highlights an important point: nefarious hackers do not just pose a risk to vulnerable companies; cyber attacks can potentially impact the trajectory of democracies.

Journal Article - Strife

A Beginner's Guide to the Musical Scales of Cyberwar

| Dec. 28, 2016

"Whether you are a cybersecurity professional, policymaker, or student, this article is a beginner's guide to understanding the 'musical scales' of cyberwar. Using the analogy of a piano keyboard, it aims to promote an understanding of what constitutes a use of force in cyberspace and how a state may lawfully respond."

Journal Article - Small Wars Journal

Twilight Zone Conflicts: Employing Gray Tactics in Cyber Operations

| October 27, 2016

"...[A]ctors that employ gray tactics in cyber operations need not be successful in actually infiltrating a system to further their revisionist ambitions. Rather, the sheer ramifications from the cyber action itself, has the power to disturb a nation's psyche and challenge the geopolitical status quo."