Masashi Crete‐Nishihata

ORCID: 0000-0002-2658-1371
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet Traffic Analysis and Secure E-voting
  • Network Security and Intrusion Detection
  • Cybercrime and Law Enforcement Studies
  • Advanced Malware Detection Techniques
  • Privacy, Security, and Data Protection
  • Asian Geopolitics and Ethnography
  • Social Media and Politics
  • Spam and Phishing Detection
  • Cybersecurity and Cyber Warfare Studies
  • Southeast Asian Sociopolitical Studies
  • China's Ethnic Minorities and Relations
  • Information and Cyber Security
  • Dementia and Cognitive Impairment Research
  • China's Socioeconomic Reforms and Governance
  • Identity, Memory, and Therapy
  • Misinformation and Its Impacts
  • Crime, Illicit Activities, and Governance
  • Network Packet Processing and Optimization
  • Technology Use by Older Adults
  • Politics and Conflicts in Afghanistan, Pakistan, and Middle East
  • Taxation and Legal Issues
  • Intelligence, Security, War Strategy
  • ICT in Developing Communities
  • South Asian Studies and Conflicts
  • Terrorism, Counterterrorism, and Political Violence

University of Toronto
2009-2021

Public Citizen
2015-2021

While the rhetoric of cyber war is often exaggerated, there have been recent cases international conflict in which cyberspace has played a prominent role. In this article, we analyze impact between Russia and Georgia over disputed territory South Ossetia August 2008. We examine role strategic communications, information operations, operations through cyberspace, conventional combat to account for political military outcomes conflict. The 2008 reveals some emergent issues warfare that can be...

10.1177/0967010611431079 article EN Security Dialogue 2012-02-01

Abstract States are moving to assert their interests more forcefully in cyberspace and associated governance regimes. Traditionally, transnational networks of engineers, based primarily the United Europe, have been primary architects governance, with users private sector shaping itself. However, governments becoming increasingly influential across a number forums deliberating on how exercise power through cyberspace. Particularly noteworthy nondemocratic states outside North America, parts...

10.1163/19426720-01803006 article EN Global Governance A Review of Multilateralism and International Organizations 2012-08-12

Research has shown that personal memory technologies are a promising way to address the needs of older adults with impairments. In this article, we review three recently completed studies evaluated for memories intended persons Alzheimer's disease (AD) or mild cognitive impairment (MCI). first study, worked 12 participants AD MCI and their families construct DVD-based Multimedia Biographies depicted prominent events, people, places from participant's past. We then over period 6 months...

10.1080/07370024.2012.656062 article EN Human-Computer Interaction 2012-04-05

Purpose: The purpose of this feasibility pilot project was to observe Alzheimer's disease (AD) and mild cognitive impairment (MCI) patients' responses personalized multimedia biographies (MBs). We developed a procedure for using digital video technology construct DVD-based MBs persons with AD or MCI, documented their observing MBs, evaluated the psychosocial benefits. Methods: An interdisciplinary team consisting biographers social workers interviewed 12 family members MCI collected archival...

10.1093/geront/gnp104 article EN The Gerontologist 2009-07-10

The multimedia biography tells the story of life an elderly person with a cognitive impairment in motion picture format. combines family photographs, film clips, audio narration, and music. It is intended to be screened on ongoing basis provide spaces for reminiscence communication between cognitively impaired persons their families. Using production process which we collaborated caregivers, created 12 biographies having Alzheimer's disease or mild impairment. This article describes our...

10.1080/15228830903329831 article EN Journal of Technology in Human Services 2009-11-04

In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, had been analyzed little automation, focusing on what content blocked, rather than how blocking was carried out. use more rigorous automation obtain a longitudinal, global view technical means used for censorship. We also identify that missed prior analyses. Our results point considerable...

10.1145/2700339 article EN ACM Transactions on the Web 2015-01-23

Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed improve performance protect users from inappropriate content, these products are also censor the by authoritarian regimes around globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export. Our contribution is present methods identifying installations of URL filtering confirming censorship. We first...

10.1145/2504730.2504763 article EN 2013-10-22

This article is an exploratory study of the influence beat and employment status on information security culture journalism (security-related values, mental models, practices that are shared across profession). The based semi-structured interviews with 16 journalists in Canada staff or freelance positions working investigative non-investigative beats. We find has a multitude cultures influenced by status. perceived need for tied to perceptions sensitivity particular story source. Beat...

10.1080/21670811.2020.1777882 article EN cc-by-nc-nd Digital Journalism 2020-06-25

In this paper, we present an analysis of over one year and a half data from tracking the censorship surveillance keyword lists two instant messaging programs used in China. Through reverse engineering TOM-Skype Sina UC, were able to obtain URLs encryption keys for various versions these have been downloading blacklists daily. This paper examines social political contexts behind contents lists, analyzes those times when list has updated, including correlations with current events.

10.5210/fm.v18i7.4628 article EN First Monday 2013-06-30

When does repression of online expression lead to public punishment citizens in China? Chinese social media is heavily censored through a system intermediary liability which the government relies on private companies implement content controls. Outside this authorities at times utilize repress users. Under China’s regulatory environment, individuals are subject such as fines and detention for their expressions online. While censorship has become more implicit, have periodically announced...

10.1177/0920203x20963010 article EN cc-by-nc China Information 2020-10-13

Abstract This paper examines the relationship between political events and information control on WeChat through a longitudinal analysis of keyword censorship related to China's 19th National Communist Party Congress (NCPC19). We use novel method track before, during after NCPC19 probe following questions. Does change an event is over? What roles do government private companies play in China? Our findings show that system China can trigger blunt reactions events. In addition critical content...

10.1017/s0305741020000491 article EN cc-by-nc-sa The China Quarterly 2020-07-02

Tibet is one of the most restrictive places in world for press freedom, with information online and offline tightly controlled censored by Chinese government. Foreign correspondents are restricted from travelling to reporting Tibetan areas, while Tibetans who act as sources often persecuted. Despite this level repression, still find ways tell rest what happening Tibet. This paper explores how it possible authoritatively report on events world’s freedom. Instead relying a single individual or...

10.1177/14648849211044899 article EN cc-by Journalism 2021-09-08

The study of information controls is a multidisciplinary challenge. Technical measurements are essential to such study, but they do not provide insight into why regimes enact or what those controls' social and political effects might be. Investigating these questions requires that researchers pay attention ideas, values, power relations. Interpreting technical data using contextual knowledge science methods can lead greater insights than either approaches alone. OpenNet Initiative has been...

10.1109/mic.2013.29 article EN IEEE Internet Computing 2013-04-03

We provide an overview of technical and ethical considerations for measuring Internet filtering, focusing on client-side network side channel techniques. Client-side measurements are any measurement that relies software deployed a vantage point. Users typically involved in installing running the software, informed consent process to ensure users aware risks doing so should be followed. However, relative risk is highly contextually specific, can vary depending location background user...

10.1145/2793013.2793021 article EN 2015-08-21

ABSTRACT We investigate empirically whether the introduction of General Data Protection Regulation (GDPR) improved compliance with data protection rights people who are not formally protected under GDPR. By measuring right access for European Union (EU) and Canadian residents, we find that this is indeed case. argue likely caused by Brussels Effect, a mechanism whereby policy diffuses primarily through market mechanisms. suggest willingness to back up its rules strong enforcement, as it did...

10.5325/jinfopoli.11.2021.0301 article EN cc-by-nc-nd Journal of Information Policy 2021-06-28
Coming Soon ...