Title |
Speakers |
Summary |
Topic Types |
Measuring Decentralization of Chinese Keyword Censorship via Mobile Games |
Jeffrey Knockel
,
Masashi Crete-nishihata
,
Lotus Ruan
|
China has the world’s largest mobile gaming market. Like other technology and Internet companies operating ... |
|
The Decline of Social Media Censorship and the Rise of Self-Censorship after the 2016 Failed Turkish Coup |
Dan S. Wallach
,
Rima Tanash
,
Zhouhan Chen
,
Melissa Marschall
|
In this work, we examine the effect of the 2016 Turkish coup on social media ... |
|
Autosonda: Discovering Rules and Triggers of Censorship Devices |
Nicholas Weaver
,
Jill Jermyn
|
Using censorship to forbid access to certain content on the internet is very common in ... |
|
Ambivalence in the (Private) Public Sphere: How Global Digital Activists Navigate Risk |
Sarah Myers West
|
This paper seeks to provide insight into how digital activists navigate the risks posed to ... |
|
Creative and Set in Their Ways: Challenges of Security Sensemaking in Newsrooms |
Franziska Roesner
,
Kelly Caine
,
Mahdi Nasrullah Al-ameen
,
Susan E. Mcgregor
,
Elizabeth Anne Watkins
|
Maintaining computer security in an organization requires navigating a thorny landscape of adversaries, devices, and ... |
|
Measuring Offensive Speech in Online Political Discourse |
Phillipa Gill
,
Rishab Nithyanand
,
Brian Schaffner
|
The Internet and online forums such as Reddit have become an increasingly popular medium for ... |
|
SecurePost: Verified Group-Anonymity on Social Media |
Ben Y. Zhao
,
Michael Nekrasov
,
Daniel Iland
,
Miriam Metzger
,
Elizabeth Belding
|
As Internet freedoms are increasingly threatened both at home and abroad, marginalized groups, such as ... |
|
An ISP-Scale Deployment of TapDance |
Nikita Borisov
,
Alex Halderman
,
Eric Wustrow
,
Will Scott
,
Benjamin Vandersloot
,
Sergey Frolov
,
Fred Douglas
,
Allison Mcdonald
,
Rod Hynes
,
Adam Kruger
,
Michalis Kallitsis
,
David G. Robinson
|
We report initial results from the world’s first ISP-scale field trial of a refraction networking ... |
|
Alice and Bob, who the FOCI are they?: Analysis of end-to-end encryption in the LINE messaging application |
Jedidiah R. Crandall
,
Masashi Crete-nishihata
,
Andrew Hilts
,
Antonio M. Espinoza
,
William J. Tolley
|
End-to-end encryption (E2EE) is becoming a standard feature in many popular chat apps, but independent ... |
|