Skip to main content

Showing 1–7 of 7 results for author: Onaolapo, J

.
  1. arXiv:2210.10026  [pdf, other

    cs.SI cs.CY physics.soc-ph

    Diverse Misinformation: Impacts of Human Biases on Detection of Deepfakes on Networks

    Authors: Juniper Lovato, Laurent Hébert-Dufresne, Jonathan St-Onge, Randall Harp, Gabriela Salazar Lopez, Sean P. Rogers, Ijaz Ul Haq, Jeremiah Onaolapo

    Abstract: Social media platforms often assume that users can self-correct against misinformation. However, social media users are not equally susceptible to all misinformation as their biases influence what types of misinformation might thrive and who might be at risk. We call "diverse misinformation" the complex relationships between human biases and demographics represented in misinformation. To investiga… ▽ More

    Submitted 13 January, 2024; v1 submitted 18 October, 2022; originally announced October 2022.

    Comments: Supplementary appendix available upon request for the time being

  2. arXiv:2006.16140  [pdf, other

    physics.soc-ph cs.CY cs.SI

    Limits of Individual Consent and Models of Distributed Consent in Online Social Networks

    Authors: Juniper Lovato, Antoine Allard, Randall Harp, Jeremiah Onaolapo, Laurent Hébert-Dufresne

    Abstract: Personal data are not discrete in socially-networked digital environments. A user who consents to allow access to their profile can expose the personal data of their network connections to non-consented access. Therefore, the traditional consent model (informed and individual) is not appropriate in social networks where informed consent may not be possible for all users affected by data processing… ▽ More

    Submitted 11 April, 2022; v1 submitted 29 June, 2020; originally announced June 2020.

  3. arXiv:1704.07759  [pdf, other

    cs.CY cs.CL

    Email Babel: Does Language Affect Criminal Activity in Compromised Webmail Accounts?

    Authors: Emeric Bernard-Jones, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: We set out to understand the effects of differing language on the ability of cybercriminals to navigate webmail accounts and locate sensitive information in them. To this end, we configured thirty Gmail honeypot accounts with English, Romanian, and Greek language settings. We populated the accounts with email messages in those languages by subscribing them to selected online newsletters. We hid em… ▽ More

    Submitted 25 April, 2017; originally announced April 2017.

  4. arXiv:1702.04256  [pdf, other

    cs.SI

    What's in a Name? Understanding Profile Name Reuse on Twitter

    Authors: Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini

    Abstract: Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their correspondin… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Comments: International World Wide Web Conference 2017

  5. arXiv:1610.03452  [pdf, other

    cs.SI cs.CY cs.HC physics.soc-ph

    Kek, Cucks, and God Emperor Trump: A Measurement Study of 4chan's Politically Incorrect Forum and Its Effects on the Web

    Authors: Gabriel Emile Hine, Jeremiah Onaolapo, Emiliano De Cristofaro, Nicolas Kourtellis, Ilias Leontiadis, Riginos Samaras, Gianluca Stringhini, Jeremy Blackburn

    Abstract: The discussion-board site 4chan has been part of the Internet's dark underbelly since its inception, and recent political events have put it increasingly in the spotlight. In particular, /pol/, the "Politically Incorrect" board, has been a central figure in the outlandish 2016 US election season, as it has often been linked to the alt-right movement and its rhetoric of hate and racism. However, 4c… ▽ More

    Submitted 1 October, 2017; v1 submitted 11 October, 2016; originally announced October 2016.

    Comments: A shorter version of this paper appears in the Proceedings of the 11th International AAAI Conference on Web and Social Media (ICWSM'17). Please cite the ICWSM'17 paper. Corresponding author: [email protected]

  6. arXiv:1607.00801  [pdf, other

    cs.CR

    Honey Sheets: What Happens to Leaked Google Spreadsheets?

    Authors: Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: Cloud-based documents are inherently valuable, due to the volume and nature of sensitive personal and business content stored in them. Despite the importance of such documents to Internet users, there are still large gaps in the understanding of what cybercriminals do when they illicitly get access to them by for example compromising the account credentials they are associated with. In this paper,… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

  7. arXiv:1607.00117  [pdf, other

    cs.CR cs.CY cs.SI

    All Your Cards Are Belong To Us: Understanding Online Carding Forums

    Authors: Andreas Haslebacher, Jeremiah Onaolapo, Gianluca Stringhini

    Abstract: Underground online forums are platforms that enable trades of illicit services and stolen goods. Carding forums, in particular, are known for being focused on trading financial information. However, little evidence exists about the sellers that are present on carding forums, the precise types of products they advertise, and the prices buyers pay. Existing literature mainly focuses on the organisat… ▽ More

    Submitted 24 January, 2017; v1 submitted 1 July, 2016; originally announced July 2016.