The period leading to and immediately after the release of the IPCC's fifth series of climate change assessments saw substantial efforts by climate change denial interests to portray anthropogenic climate change (ACC) as either unproven theory or a negligible contribution to natural climate variability, including the relationship between tourism and climate change. This paper responds to those claims by stressing that the extent of scientific consensus suggests that human-induced warming of the climate system is unequivocal. Second, it responds in the context of tourism research and ACC, highlighting tourism's significant contribution to greenhouse gas emissions, as well as climate change's potential impacts on tourism at different scales. The paper exposes the tactics used in ACC denial papers to question climate change science by referring to non-peer-reviewed literature, outlier studies, and misinterpretation of research, as well as potential links to think tanks and interest groups. The paper concludes that climate change science does need to improve its communication strategies but that the world-view of some individuals and interests likely precludes acceptance. The connection between ACC and sustainability illustrates the need for debate on adaptation and mitigation strategies, but that debate needs to be grounded in scientific principles not unsupported skepticism.
LINK
Public transgressions by group members threaten the public image of a group when outside observers perceive them as representative of the group in general. In three studies, we tested the effectiveness of rejection of a deviant group member who made a racist comment in public, and compared this to several other strategies the group could employ to protect their image. In Study 1 (N¼75) and Study 2 (N¼51), the group was judged less racist after rejecting the deviant than after claiming a non-racist position or not responding to the transgression. Perceived typicality of the deviant partially mediated this effect in Study 2. In Study 3 (N¼81), the group was judged least racist after forcing the deviant to apologize and as most racist after denying the severity of the transgression. Results also showed a negative side-effect of rejection. Perceived exclusion of the deviant contributed to a perception of the group as disloyal to its members, which resulted in a less favorable overall group evaluation. Potential benefits and risks of rejection, denial, and apologies are further discussed in the General Discussion.
DOCUMENT
Cybercrime as a service is lowering the barrier to entry for crime. Aspiring criminals can access cybercrime services through the clear web using search engines. One such cybercrime service is booters, web platforms that offer affordable distributed denial of service attacks for hire. Law enforcement agencies have tried to counter this trend by running online ad campaigns on platforms like Google. For these campaigns to effectively divert and deter potential cybercriminals, they must first reach the intended audience. Yet, it remains uncertain whether this is the case. This study assesses Google online search data from two campaigns deployed in the Netherlands in 2021 to determine whether the campaigns actually reached potential cybercriminals. The results indicate that certain online searches likely had criminal intent, implying that the campaigns – to some extent – successfully reached the intended population. Furthermore, the findings reveal that online searches can serve to identify active booters, providing valuable assistance to law enforcement agencies in taking down such services.
DOCUMENT
Over the past decade, the trend in both the public sector and industry has been to outsource ICT to the cloud. While cost savings are often used as a rationale for outsourcing, another argument that is frequently used is that the cloud improves security. The reasoning behind this is twofold. First, cloud service providers are typically thought to have skilled staff trained in good security practices. Second, cloud providers often have a vastly distributed, highly connected network infrastructure, making them more resilient in the face of outages and denial-of-service attacks. Yet many examples of cloud outages, often due to attacks, call into question whether outsourcing to the cloud does improve security. In this project our goal therefore is to answer two questions: 1) did the cloud make use more secure?and 2) can we provide specific security guidance to support cloud outsourcing strategies? We will approach these questions in a multi-disciplinary fashion from a technical angle and from a business and management perspective. On the technical side, the project will focus on providing comprehensive insight into the attack surface at the network level of cloud providers and their users. We will use a measurement-based approach, leveraging large scale datasets about the Internet, both our own data (e.g. OpenINTEL, a large- scale dataset of active DNS measurements) and datasets from our long-term collaborators, such as CAIDA in the US (BGPStream, Network Telescope) and Saarland University in Germany (AmpPot). We will use this data to study the network infrastructure outside and within cloud environments to structurally map vulnerabilities to attacks as well as to identify security anti-patterns, where the way cloud services are managed or used introduce a weak point that attackers can target. From a business point of view, we will investigate outsourcing strategies for both the cloud providers and their customers. For guaranteeing 100% availability, cloud service providers have to maintain additional capacity at all times. They also need to forecast capacity requirements continuously for financially profitable decisions. If the forecast is lower than the capacity needed, then the cloud is not able to deliver 100% availability in case of an attack. Conversely, if the forecast is substantially higher, the cloud service provider might not be able to make desired profits. We therefore propose to assess the risk profiles of cloud providers (how likely it is a cloud provider is under attack at a given time given the nature of its customers) using available attack data to improve the provider resilience to future attacks. From the costumer perspective, we will investigate how we can support cloud outsourcing by taking into consideration business and technical constraints. Decision to choose a cloud service provider is typically based on multiple criteria depending upon the company’s needs (security and operational). We will develop decision support systems that will help in mapping companies’ needs to cloud service providers’ offers.