- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Cybercrime and Law Enforcement Studies
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- Asian Geopolitics and Ethnography
- Social Media and Politics
- Spam and Phishing Detection
- Cybersecurity and Cyber Warfare Studies
- Southeast Asian Sociopolitical Studies
- China's Ethnic Minorities and Relations
- Information and Cyber Security
- Dementia and Cognitive Impairment Research
- China's Socioeconomic Reforms and Governance
- Identity, Memory, and Therapy
- Misinformation and Its Impacts
- Crime, Illicit Activities, and Governance
- Network Packet Processing and Optimization
- Technology Use by Older Adults
- Politics and Conflicts in Afghanistan, Pakistan, and Middle East
- Taxation and Legal Issues
- Intelligence, Security, War Strategy
- ICT in Developing Communities
- South Asian Studies and Conflicts
- Terrorism, Counterterrorism, and Political Violence
University of Toronto
2009-2021
Public Citizen
2015-2021
While the rhetoric of cyber war is often exaggerated, there have been recent cases international conflict in which cyberspace has played a prominent role. In this article, we analyze impact between Russia and Georgia over disputed territory South Ossetia August 2008. We examine role strategic communications, information operations, operations through cyberspace, conventional combat to account for political military outcomes conflict. The 2008 reveals some emergent issues warfare that can be...
Abstract States are moving to assert their interests more forcefully in cyberspace and associated governance regimes. Traditionally, transnational networks of engineers, based primarily the United Europe, have been primary architects governance, with users private sector shaping itself. However, governments becoming increasingly influential across a number forums deliberating on how exercise power through cyberspace. Particularly noteworthy nondemocratic states outside North America, parts...
Research has shown that personal memory technologies are a promising way to address the needs of older adults with impairments. In this article, we review three recently completed studies evaluated for memories intended persons Alzheimer's disease (AD) or mild cognitive impairment (MCI). first study, worked 12 participants AD MCI and their families construct DVD-based Multimedia Biographies depicted prominent events, people, places from participant's past. We then over period 6 months...
Purpose: The purpose of this feasibility pilot project was to observe Alzheimer's disease (AD) and mild cognitive impairment (MCI) patients' responses personalized multimedia biographies (MBs). We developed a procedure for using digital video technology construct DVD-based MBs persons with AD or MCI, documented their observing MBs, evaluated the psychosocial benefits. Methods: An interdisciplinary team consisting biographers social workers interviewed 12 family members MCI collected archival...
The multimedia biography tells the story of life an elderly person with a cognitive impairment in motion picture format. combines family photographs, film clips, audio narration, and music. It is intended to be screened on ongoing basis provide spaces for reminiscence communication between cognitively impaired persons their families. Using production process which we collaborated caregivers, created 12 biographies having Alzheimer's disease or mild impairment. This article describes our...
In this study, we take another look at 5 years of web censorship data gathered by the OpenNet Initiative in 77 countries using user-based testing with locally relevant content. Prior to our work, had been analyzed little automation, focusing on what content blocked, rather than how blocking was carried out. use more rigorous automation obtain a longitudinal, global view technical means used for censorship. We also identify that missed prior analyses. Our results point considerable...
Products used for managing network traffic and restricting access to Web content represent a dual-use technology. While they were designed improve performance protect users from inappropriate content, these products are also censor the by authoritarian regimes around globe. This dual use has not gone unnoticed, with Western governments placing restrictions on their export. Our contribution is present methods identifying installations of URL filtering confirming censorship. We first...
This article is an exploratory study of the influence beat and employment status on information security culture journalism (security-related values, mental models, practices that are shared across profession). The based semi-structured interviews with 16 journalists in Canada staff or freelance positions working investigative non-investigative beats. We find has a multitude cultures influenced by status. perceived need for tied to perceptions sensitivity particular story source. Beat...
In this paper, we present an analysis of over one year and a half data from tracking the censorship surveillance keyword lists two instant messaging programs used in China. Through reverse engineering TOM-Skype Sina UC, were able to obtain URLs encryption keys for various versions these have been downloading blacklists daily. This paper examines social political contexts behind contents lists, analyzes those times when list has updated, including correlations with current events.
When does repression of online expression lead to public punishment citizens in China? Chinese social media is heavily censored through a system intermediary liability which the government relies on private companies implement content controls. Outside this authorities at times utilize repress users. Under China’s regulatory environment, individuals are subject such as fines and detention for their expressions online. While censorship has become more implicit, have periodically announced...
Abstract This paper examines the relationship between political events and information control on WeChat through a longitudinal analysis of keyword censorship related to China's 19th National Communist Party Congress (NCPC19). We use novel method track before, during after NCPC19 probe following questions. Does change an event is over? What roles do government private companies play in China? Our findings show that system China can trigger blunt reactions events. In addition critical content...
Tibet is one of the most restrictive places in world for press freedom, with information online and offline tightly controlled censored by Chinese government. Foreign correspondents are restricted from travelling to reporting Tibetan areas, while Tibetans who act as sources often persecuted. Despite this level repression, still find ways tell rest what happening Tibet. This paper explores how it possible authoritatively report on events world’s freedom. Instead relying a single individual or...
The study of information controls is a multidisciplinary challenge. Technical measurements are essential to such study, but they do not provide insight into why regimes enact or what those controls' social and political effects might be. Investigating these questions requires that researchers pay attention ideas, values, power relations. Interpreting technical data using contextual knowledge science methods can lead greater insights than either approaches alone. OpenNet Initiative has been...
We provide an overview of technical and ethical considerations for measuring Internet filtering, focusing on client-side network side channel techniques. Client-side measurements are any measurement that relies software deployed a vantage point. Users typically involved in installing running the software, informed consent process to ensure users aware risks doing so should be followed. However, relative risk is highly contextually specific, can vary depending location background user...
ABSTRACT We investigate empirically whether the introduction of General Data Protection Regulation (GDPR) improved compliance with data protection rights people who are not formally protected under GDPR. By measuring right access for European Union (EU) and Canadian residents, we find that this is indeed case. argue likely caused by Brussels Effect, a mechanism whereby policy diffuses primarily through market mechanisms. suggest willingness to back up its rules strong enforcement, as it did...