Spamming for science: Active measurement in web 2.0 abuse research
dc.contributor.author | West, A. | |
dc.contributor.author | Hayati, P. | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Lee, I. | |
dc.date.accessioned | 2017-12-10T12:41:12Z | |
dc.date.available | 2017-12-10T12:41:12Z | |
dc.date.created | 2017-12-10T12:20:10Z | |
dc.date.issued | 2012 | |
dc.identifier.citation | West, A. and Hayati, P. and Potdar, V. and Lee, I. 2012. Spamming for Science: Active Measurement in Web 2.0 Abuse Research, in Blyth J., Dietrich S., Camp L.J. (eds), FC 2012: Financial Cryptography and Data Security, Lecture Notes in Computer Science, Vol. 7398, pp. 98-111. Berlin: Springer. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/59598 | |
dc.identifier.doi | 10.1007/978-3-642-34638-5_9 | |
dc.description.abstract |
Spam and other electronic abuses have long been a focus of computer security research. However, recent work in the domain has emphasized an economic analysis of these operations in the hope of understanding and disrupting the profit model of attackers. Such studies do not lend themselves to passive measurement techniques. Instead, researchers have become middle-men or active participants in spam behaviors; methodologies that lie at an interesting juncture of legal, ethical, and human subject (e.g., IRB) guidelines. In this work two such experiments serve as case studies: One testing a novel link spam model on Wikipedia and another using blackhat software to target blog comments and forums. Discussion concentrates on the experimental design process, especially as influenced by human-subject policy. Case studies are used to frame related work in the area, and scrutiny reveals the computer science community requires greater consistency in evaluating research of this nature. | |
dc.publisher | Springer | |
dc.title | Spamming for science: Active measurement in web 2.0 abuse research | |
dc.type | Book Chapter | |
dcterms.source.volume | 7398 LNCS | |
dcterms.source.startPage | 98 | |
dcterms.source.endPage | 111 | |
dcterms.source.title | Financial Cryptography and Data Security, Lecture Notes in Computer Science | |
dcterms.source.isbn | 9783642346378 | |
dcterms.source.place | USA | |
dcterms.source.chapter | 13 | |
curtin.department | School of Information Systems | |
curtin.accessStatus | Fulltext not available |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |