Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Michael Lesk is active.

Publication


Featured researches published by Michael Lesk.


ieee symposium on security and privacy | 2007

The New Front Line: Estonia under Cyberassault

Michael Lesk

Estonia, although small is a remarkably Web-dependent country, with widespread Internet access, digital identity cards, an 80-percent usage rate for online banking, electronic tax collection, and remote medical monitoring. The DDoS attacks began on the foreign ministers Web site, but spread to all government institutions and key businesses, such as banks. On balance, the Estonian cyberwar ought to be a wake up call. Producing so much disruption for so little money has to be attractive to many groups. We know that people with evil intentions watched what happened; we can only hope that people with good intentions watched as well.


Proceedings of the IEEE | 2012

Privacy and Cybersecurity: The Next 100 Years

Carl E. Landwehr; Dan Boneh; John C. Mitchell; Steven Michael Bellovin; Susan Landau; Michael Lesk

The past and the future of privacy and cybersecurity are addressed from four perspectives, by different authors: theory and algorithms, technology, policy, and economics. Each author considers the role of the threat from the corresponding perspective, and each adopts an individual tone, ranging from a relatively serious look at the prospects for improvement in underlying theory and algorithms to more lighthearted considerations of the unpredictable futures of policy and economics.


ACM Transactions on Information Systems | 1997

Making a digital library: the contents of the CORE project

Richard Entlich; Jan Olsen; Lorrin R. Garson; Michael Lesk; Lorraine Normore; Stuart Weibel

The CORE (Chemical Online Retrieval Experiment) project is a library of primary journal articles in chemistry. Any library has an inside and an outside; in this article we describe the inside of the library and the methods for building the system and accumulating the database. A later article will describe the outside (user experiences). Among electronic-library projects, the CORE project is unusual in that it has both ASCII derived from typesetting and image data for all its pages, and among experimental electronic-library projects, it is unusually large. We describe here (a) the processes of scanning and analyzing about 400,000 pages of primary journal material, (b) the conversion of a similar amount of textual database material, (c) the linking of these two data sources, and (d) the indexing of the text material.


ieee symposium on security and privacy | 2011

Cybersecurity and Economics

Michael Lesk

Estimates of losses to cybercrime vary widely. In 2010, Internet crime loss by individuals totaled


ieee symposium on security and privacy | 2013

Big Data, Big Brother, Big Money

Michael Lesk

560 million. Phishing alone resulted in


Proceedings of the National Academy of Sciences of the United States of America | 2015

How many scientific papers are not original

Michael Lesk

120 million per quarter. A Symantec-commissioned StrategyOne report found that 65 percent of computer users have spent 28 hours and


multimedia information retrieval | 2007

New challenges in multimedia research for the increasingly connected and fast growing digital society

Jia Li; Shih-Fu Chang; Michael Lesk; Rainer Lienhart; Jiebo Luo; Arnold W. M. Smeulders

300 dealing with cybercrime; McAfee estimated a


Archive | 2009

Protecting Persons While Protecting the People

Cecilia S. Gal; Paul B. Kantor; Michael Lesk

1 trillion global cost. A single botnet ring took


International Journal of Digital Curation | 2008

Recycling Information: Science Through Data Mining

Michael Lesk

100 million before the FBI managed to stop it. The UK government estimates that each year the country loses 27 billion to cybercrime, which extrapolated to the US population and converted to dollars would be approximately


ieee symposium on security and privacy | 2008

Digital Rights Management and Individualized Pricing

Michael Lesk

210 billion. The UKs response will be 650 million for cybersecurity. A few years ago, Consumer Reports gave a relatively low number for US cybercrime loss-

Collaboration


Dive into the Michael Lesk's collaboration.

Top Co-Authors

Avatar

Judith Gelernter

Carnegie Mellon University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lorraine Normore

Chemical Abstracts Service

View shared research outputs
Researchain Logo
Decentralizing Knowledge