Business

How to redesign social media algorithms to bridge divides

Social media platforms have been implicated in conflicts of all scales, from urban gun violence to the storming of the US Capitol building on January 6 and civil war in South Sudan. Scientifically, it is difficult to tell ...

Security

Research offers novel approach for combating phishing attacks

Research in the International Journal of Electronic Security and Digital Forensics offers a new approach to combating phishing attacks in order to enhance online security and reduce cybercrime against individuals and businesses ...

Computer Sciences

Researchers build an AI system to identify social norm violations

A researcher at Ben-Gurion University of the Negev has designed an AI system that identifies social norm violations. The project is one of the first to tackle the automatic identification of social norm violations. While ...

Security

Four ways criminals could use AI to target more victims

Warnings about artificial intelligence (AI) are ubiquitous right now. They have included fearful messages about AI's potential to cause the extinction of humans, invoking images of the Terminator movies. The UK Prime Minister ...

Computer Sciences

AI: The elements of visual art recommendation

The beauty of art lies in its ability to evoke emotions and spark imagination, but understanding the message behind a piece can be challenging. Computer scientists from the University of Luxembourg have studied the potential ...

page 2 from 6