scholarly journals Cartographic Vandalism in the Era of Location-Based Games—The Case of OpenStreetMap and Pokémon GO

2020 ◽  
Vol 9 (4) ◽  
pp. 197 ◽  
Author(s):  
Levente Juhász ◽  
Tessio Novack ◽  
Hartwig Hochmair ◽  
Sen Qiao

User-generated map data is increasingly used by the technology industry for background mapping, navigation and beyond. An example is the integration of OpenStreetMap (OSM) data in widely-used smartphone and web applications, such as Pokémon GO (PGO), a popular augmented reality smartphone game. As a result of OSM’s increased popularity, the worldwide audience that uses OSM through external applications is directly exposed to malicious edits which represent cartographic vandalism. Multiple reports of obscene and anti-semitic vandalism in OSM have surfaced in popular media over the years. These negative news related to cartographic vandalism undermine the credibility of collaboratively generated maps. Similarly, commercial map providers (e.g., Google Maps and Waze) are also prone to carto-vandalism through their crowdsourcing mechanism that they may use to keep their map products up-to-date. Using PGO as an example, this research analyzes harmful edits in OSM that originate from PGO players. More specifically, this paper analyzes the spatial, temporal and semantic characteristics of PGO carto-vandalism and discusses how the mapping community handles it. Our findings indicate that most harmful edits are quickly discovered and that the community becomes faster at detecting and fixing these harmful edits over time. Gaming related carto-vandalism in OSM was found to be a short-term, sporadic activity by individuals, whereas the task of fixing vandalism is persistently pursued by a dedicated user group within the OSM community. The characteristics of carto-vandalism identified in this research can be used to improve vandalism detection systems in the future.

2008 ◽  
Vol 05 (01) ◽  
pp. 105-122 ◽  
Author(s):  
AVI MESSICA ◽  
TAMIR AGMON

We studied the optimal funding of the public sector for the Hi-Tech industry in the presence of short-term, cyclical, venture capital (VC) funding by constructing a decision-making model that results in the optimal governmental support and a model that accounts for the dynamics of the VC industry. We found that the VC industry is highly correlated with the NASDAQ stock index and that the optimal public policy for funding the Hi-Tech sector should be anti-cyclical, dynamic, and conditioned on the VC investments. The models and their validation are discussed as well as the practical implications for policy and decision makers.


Flooding is a national disaster that often occurs in Indonesia. Flood disasters require long-term and short-term action. In the short-term system, the government currently emphasizes state and private institutions to jointly reduce flood victims by developing a flood disaster early warning system. Therefore, this study discusses the making of flood early warning information systems by utilizing GSM communication systems as a means of communication between clients and servers. The GSM communication service used is the SMS Gateway. The SMS gateway service is used for the first time sending data from a flood detection system to a flood information system. Second, disseminating flood information to the public. In this study, the flood warning system for flood early warning works with the integration of three modes.The three systems are flood detection systems, flood alarm systems, and flood early warning information systems. Flood detection systems are built using ultrasonic sensors and rain sensors as inputs, Arduino Uno as data processors and GSM SIM900 modules as outputs. The alarm system consists of GSM SIM900 module as Input, Arduino Uno as processor and electric alarm as output. The flood early warning information system was built using a Wavecom GSM modem, and data processing using PHP, MySQL DBMS, and Gammu. The communication system between each system uses SMS data. This method as a whole began in a flood detection system that sends flood and rain data to the flood early warning information system. And the flood warning system sends alarm activation data to the alarm system. Finally, the system distributes flood information to the public via SMS Gateway. This research is expected to help the community in anticipating more victims with flood information previously obtained


2005 ◽  
Vol 80 (2) ◽  
pp. 723-744 ◽  
Author(s):  
Molly Mercer

This study provides a theoretical framework and experimental evidence on how managers' disclosure decisions affect their credibility with investors. I find that in the short-term, more forthcoming disclosure has a positive effect on management's reporting credibility, especially when management is forthcoming about negative news. However, these short-term credibility effects do not persist over time. In the long-term, managers who report positive earnings news are rated as having higher reporting credibility than managers who report negative earnings news, regardless of their previous disclosure decisions.


2018 ◽  
Vol 2018 ◽  
pp. 1-27 ◽  
Author(s):  
Nancy Agarwal ◽  
Syed Zeeshan Hussain

Intrusion Detection System (IDS) acts as a defensive tool to detect the security attacks on the web. IDS is a known methodology for detecting network-based attacks but is still immature in monitoring and identifying web-based application attacks. The objective of this research paper is to present a design methodology for efficient IDS with respect to web applications. In this paper, we present several specific aspects which make it challenging for an IDS to monitor and detect web attacks. The article also provides a comprehensive overview of the existing detection systems exclusively designed to observe web traffic. Furthermore, we identify various dimensions for comparing the IDS from different perspectives based on their design and functionalities. We also propose a conceptual framework of a web IDS with a prevention mechanism to offer systematic guidance for the implementation of the system. We compare its features with five existing detection systems, namely, AppSensor, PHPIDS, ModSecurity, Shadow Daemon, and AQTRONIX WebKnight. This paper will highly facilitate the interest groups with the cutting-edge information to understand the stronger and weaker sections of the domain and provide a firm foundation for developing an intelligent and efficient system.


Author(s):  
V. I. Karnyshev ◽  
◽  
V. I. Avdzeiko ◽  
V. M. Rulevskiy ◽  
E. S. Pascal ◽  
...  

The systems intended for detecting objects of artificial and natural origin are widely used while implementing the remote sensing methods. In this case, such different frequency ranges of sounding signals as radar, acoustic and optical ones are used. This article presents the results of patent analysis of the detection systems for such groups of the International Patent Classification as G01S13, G01S15, G01S17. The analysis has been carried out using the database of the United States Patent and Trademark Office (USPTO) inventions registered from 2015 to 2019. The aim of the given study was to compare the development trends of the object detection systems using the reflection or reradiation of radio-, acoustic or electromagnetic waves. It is shown that the proposed approach makes it possible to identify the promising (breakthrough) technological directions, as well as to form predictive estimates of their development in the short-term.


2021 ◽  
Vol 1 (1) ◽  
pp. 12-19
Author(s):  
Martiya Zare Jahromi ◽  
Amir Abiri Jahromi ◽  
Deepa Kundur ◽  
Scott Sanner ◽  
Marthe Kassouf

Electric power substations are experiencing an accelerated pace of digital transformation including the deployment of LAN-based IEC 61850 communication protocols that facilitate accessibility to substation data while also increasing remote access points and exposure to complex cyberattacks. In this environment, machine learning algorithms will play a vital role in cyberattack detection and mitigation and natural questions arise as to the most effective models in the context of smart grid substations. This paper compares the performance of three autoencoder-based anomaly detection systems including linear, fully connected, and convolutional autoencoders, as well as long short-term memory (LSTM) neural network for cybersecurity enhancement of transformer protection. The simulation results indicated that the LSTM model outperforms the other models for detecting cyberattacks targeting asymmetrical fault data. The linear autoencoder, fully connected autoencoder and 1D CNN further outperform the LSTM model for detecting cyberattacks targeting the symmetrical fault data.


2016 ◽  
Vol 9 (1) ◽  
pp. 157-162 ◽  
Author(s):  
Kristine M. Kuhn

Bergman and Jean (2016) include freelancers as one of the categories of workers who are understudied in the industrial and organizational (I-O) psychology literature. This neglect is particularly striking given the attention paid by the popular media and by politicians to the rise of the “gig economy,” comprising primarily short-term independent freelance workers (e.g., Cook, 2015; Kessler, 2014; Scheiber, 2014; Warner, 2015). This may be due in part to challenges involved in accessing and researching this population, as discussed by Bergman and Jean, but it may also arise from complexities in defining and conceptualizing freelance work, as well as from misunderstandings about the nature of the work now performed by many people who are considered freelancers. Major topics of interest to I-O psychologists such as organizational attraction, job satisfaction, and turnover may seem at first glance to lack relevance to the study of workers who are officially classified as self-employed. But there is substantial opportunity for I-O psychologists and other behaviorally oriented organizational researchers to contribute to our understanding of the growing number of people who earn all or some of their income by freelancing.


Sign in / Sign up

Export Citation Format

Share Document