Search

Category : "Social and Behavioral Sciences" with 298 Results

In recent years, there has been widespread concern that misinformation on social media is damaging societies and democratic institutions. In response, social media platforms have announced actions to limit the spread of false content. We measure trends in the diffusion of content from 569 fake news websites and 9540 fake news stories on Facebook and Twitter between January 2015 and July 2018. User interactions with false content rose steadily on both Facebook and Twitter through the end of 2016. Since then, however, interactions with false content have fallen sharply on Facebook while continuing to rise on Twitter, with the ratio of Facebook engagements to Twitter shares decreasing by 60%. In comparison, interactions with other news, business, or culture sites have followed similar trends on both platforms. Our results suggest that the relative magnitude of the misinformation problem on Facebook has declined since its peak.

Available in :
  • 1
  • 0

Accusations of Russian hacking in the 2016 US presidential election has raised the salience of cyber security among the American public. However, there are still a number of unanswered questions about the circumstances under which particular policy responses are warranted in response to a cyber-attack and the public’s attitudes about the conditions that justify this range of responses. This research investigates the attributes of a cyber-attack that affect public support for retaliation. It finds that cyber-attacks that produce American casualties dramatically increase support for retaliatory airstrikes compared to attacks with economic consequences. Assessments of attribution that have bipartisan support increase support to a lesser extent but for a broader range of retaliatory measures. The findings have important implications for ongoing debates about cyber security policy.

Available in :
  • 1
  • 0

Four key events are addressed in this briefing note. Key event one is the announcement in April and May of 2017 with the launch of two supercomputers in Canada (Graham at University of Waterloo; Cedar at Simon Fraser University) and a third (Niagara at The University of Toronto) using Compute Canada’s Resources Allocation (Compute Canada, 2018a). Key event two is the announcement that Huawei Canada is building Graham’s operating system (Feldman, 2017). Key event three entails CSIS being warned by the US Senators (Rep. Sen Marco Rubio and Dem. Sen Mark Warner) about the possibility of China and Russia spying on Canada. Key event four, the United States has reportedly banned sales of Huawei products on US military bases (Bronskill, 2018; Collins, 2018). This briefing note is particularly relevant as Compute Canada is now preparing for 2019 resource allocation; there may be a raised/elevated security risk of economic espionage intellectual property theft and abusing education access privileges which needs to be considered (SFU Innovates Staff, 2018).

Available in :
  • 1
  • 0

On October 19th, 2018, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its ninth roundtable meeting which covered “Cybersecurity in an Information Warfare Age.” The following presentation was hosted by Dr. Steven Pearce, a lecturer in the School of Computing Sciences at Simon Fraser University and an astrophysicist by trade. Dr. Pearce has over 30 years of experience in mathematics and technology, focusing on the theory of technology and socio-technology. In his presentation, Dr. Pearce used these themes to highlight how technological advancements accelerated the destructive capabilities of humans, while simultaneously warning of conflating cyberwarfare with information warfare as it detracts from their unique underpinnings and objectives. The subsequent roundtable discussion centered around a case study where Chinese microchips that create back- door access to systems were found embedded in server motherboards that Amazon purchased. After discovery, they were allegedly shown to have been distributed to banks, companies and US defence agencies. Thereafter, audience members discussed the security implications of hardware hacks and what the Canadian government and citizens could change to safeguard against both software and hardware hacks.

Available in :
  • 1
  • 0

Cybercrime has been a contentious issue among security actors, vis-à-vis the extent to which international cooperation may be fostered to respond to the accelerating incidence of cyber-attacks. This paper contrasts between the cyber- governance approaches adopted by two non-Western regional organizations, the Association of Southeast Asian Nations and the Gulf Cooperation Council, over the past decade. Considering their similar institutional origins, Most Similar Systems Design methodology was employed to assess how ASEAN and GCC have distinctly responded to cybercrime. It considers the dynamics of the digital divide — a divide which is exacerbated by the COVID-19 pandemic — and in which ASEAN and the GCC are challenged to bolster their cyber-capabilities. Findings reveal that GCC increasingly diffuses norms of international cooperation to tackle cybercrime. By contrast, ASEAN embodies cyber norms which regulate behavior along the lines of intra-regional cooperation, wherein norms of international cooperation are rendered subsidiary to norms of regional autonomy.

Available in :
  • 1
  • 0