FOCI 2017 Aug. 14, 2017 to Aug. 14, 2017, vancouver,canada

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games Jeffrey Knockel , Masashi Crete-nishihata , Lotus Ruan China has the world’s largest mobile gaming market. Like other technology and Internet companies operating ...
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup Dan S. Wallach , Rima Tanash , Zhouhan Chen , Melissa Marschall In this work, we examine the effect of the 2016 Turkish coup on social media ...
Autosonda: Discovering Rules and Triggers of Censorship Devices Nicholas Weaver , Jill Jermyn Using censorship to forbid access to certain content on the internet is very common in ...
Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk Sarah Myers West This paper seeks to provide insight into how digital activists navigate the risks posed to ...
Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms Franziska Roesner , Kelly Caine , Mahdi Nasrullah Al-ameen , Susan E. Mcgregor , Elizabeth Anne Watkins Maintaining computer security in an organization requires navigating a thorny landscape of adversaries, devices, and ...
Measuring Offensive Speech in Online Political Discourse Phillipa Gill , Rishab Nithyanand , Brian Schaffner The Internet and online forums such as Reddit have become an increasingly popular medium for ...
SecurePost: Verified Group-Anonymity on Social Media Ben Y. Zhao , Michael Nekrasov , Daniel Iland , Miriam Metzger , Elizabeth Belding As Internet freedoms are increasingly threatened both at home and abroad, marginalized groups, such as ...
An ISP-Scale Deployment of TapDance Nikita Borisov , Alex Halderman , Eric Wustrow , Will Scott , Benjamin Vandersloot , Sergey Frolov , Fred Douglas , Allison Mcdonald , Rod Hynes , Adam Kruger , Michalis Kallitsis , David G. Robinson We report initial results from the world’s first ISP-scale field trial of a refraction networking ...
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application Jedidiah R. Crandall , Masashi Crete-nishihata , Andrew Hilts , Antonio M. Espinoza , William J. Tolley End-to-end encryption (E2EE) is becoming a standard feature in many popular chat apps, but independent ...