Dominika Giantas | Tallinn University of Technology (original) (raw)

Uploads

Papers by Dominika Giantas

Research paper thumbnail of Strategic considerations to counter the cyber threat of malicious deepfakes in Greek society.

Strategic considerations to counter the cyber threat of malicious deepfakes in Greek society., 2021

The issue of deepfakes and their illicit use has recently become increasingly prominent. Develop... more The issue of deepfakes and their illicit use has recently become increasingly prominent.
Developments in technology and Artificial Intelligence have caused a breakthrough in
the manipulation of audio-visual content. Additionally, social media and the Internet
have provided a fertile environment for malicious deepfakes to spread quickly. The
technology for deepfake synthesis is becoming cheaper and more accessible. Malicious
actors are utilising latest technological advances to increase the sophistication of their
deception and cases where malicious deepfakes are being used against individuals or
organisations are increasing. As a result, the concerns of governments, legislative
bodies, private sector, and Internet users are growing, and the topic is a current area of
discussion by cybersecurity experts in Greece. This study focuses on the current
deepfakes landscape in Greece and examines in detail the current legislation to address
the threat it presents. It also investigates the societal perceptions of the Greek online
community and aims to measure their exposure to malicious deepfakes and the
implications their cybersecurity. In addition, the study contributes to the research on
deepfakes detection by presenting two novel detection methods implemented in Greece.
The findings of this research contribute to a better understanding of this cyber threat.
These results could be taken into consideration by policy and law makers to assess the
level of the deepfake threat in the Greek cyber domain. They also offer a contribution
to the development of a future deepfakes strategy and options for the prevention and
mitigation of malicious deepfakes in the Greek online domain.
This thesis is written in English and is 89 pages long. It includes 9 chapters, 50 figures,
and 77 tables. It also contains 4 Annexes.

Research paper thumbnail of From Terrorism to Cyber-Terrorism: The Case of ISIS

SSRN Electronic Journal, 2018

Research paper thumbnail of Cybersecurity in the EU: Threats, Frameworks and future perspectives

Cybersecurity in the EU: Threats, Frameworks and future perspectives, 2019

For several years now, as technology integrates into our lives, security of individuals, organiza... more For several years now, as technology integrates into our lives, security of individuals, organizational and states is challenged by high-profile cyber incidents. Particularly, as the digital era began, it brought new possibilities and positive prospects for communication, trade and businesses. It provided easier and faster access, alleviated transport and several services. More and more daily activities and transactions are conducted through the use of Internet and technological devices. Soon challenges, threats and risks developed in the cyber space, rooted in the acceleration of technology. Virtual attacks are threatening government institutions, critical infrastructure. Sensitive information or personal data are exposed. The digitalization overall can create more fragile and exposed to dangers societies. Obviously, with the utilization and expansion of cyberspace, its security has been addressed as highly important for governmental and non-governmental actors.
Over the past years, the European Union has acknowledged the increasing threats deriving from the nature of our digitally driven world, the reliance on automation and the connection to data. Thus, the EU wants to take the responsibility of cyber security in its own hands by shaping a comprehensive and integral cyber security strategy for its member states as an effort to strengthen the resilience of cyberspace, mitigate the cyber threats and explore all the benefits of digital transformation.
This paper explores the territory of cyber security in the European Union. In the first place, it reflects on the challenge of defining “cybersecurity” by the European Union. Secondly, it maps the cyber security threats which pressed EU to shape a cyber security strategy. Then, it aims to identify the main cyber security capabilities, frameworks and tools of the EU. The last sectionfeatures the future steps of the European Union towards cyber security and reveals some challenges that the EU member states face in order to achieve a common cyber security policy and cyber security management at the EU level.

Research paper thumbnail of From Terrorism to Cyber-terrorism: The Case of ISIS

Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture ... more Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture to warfare have been cybernized and terrorism does not constitute an exception. From the days of Robespierre to the post 9/11 era, terrorism has been constantly transmuting in context, means and objectives and recently is making its first steps in cyberspace. Exploiting the advantages that this new field of expression, operations and confrontation has to offer like relative anonymity and abundance of easy targets, cyber-terrorism has been added to the cyber-vocabulary. The so-called Islamic State (ISIS) after its phenomenal expansion on the ground has become very active and innovative in the realm of cyber-terror. A number of organizations and individuals have pledged allegiance to ISIS and are employing their cyber-tactics in line with this terrorist organization's cyber-strategy.

Drafts by Dominika Giantas

Research paper thumbnail of From Terrorism to Cyber-terrorism: The Case of ISIS

Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture ... more Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture to warfare have been cybernized and terrorism does not constitute an exception. From the days of Robespierre to the post 9/11 era, terrorism has been constantly transmuting in context, means and objectives and recently is making its first steps in cyberspace. Exploiting the advantages that this new field of expression, operations and confrontation has to offer like relative anonymity and abundance of easy targets, cyber-terrorism has been added to the cyber-vocabulary. The so-called Islamic State (ISIS) after its phenomenal expansion on the ground has become very active and innovative in the realm of cyber-terror. A number of organizations and individuals have pledged allegiance to ISIS and are employing their cyber-tactics in line with this terrorist organization's cyber-strategy.

Research paper thumbnail of Strategic considerations to counter the cyber threat of malicious deepfakes in Greek society.

Strategic considerations to counter the cyber threat of malicious deepfakes in Greek society., 2021

The issue of deepfakes and their illicit use has recently become increasingly prominent. Develop... more The issue of deepfakes and their illicit use has recently become increasingly prominent.
Developments in technology and Artificial Intelligence have caused a breakthrough in
the manipulation of audio-visual content. Additionally, social media and the Internet
have provided a fertile environment for malicious deepfakes to spread quickly. The
technology for deepfake synthesis is becoming cheaper and more accessible. Malicious
actors are utilising latest technological advances to increase the sophistication of their
deception and cases where malicious deepfakes are being used against individuals or
organisations are increasing. As a result, the concerns of governments, legislative
bodies, private sector, and Internet users are growing, and the topic is a current area of
discussion by cybersecurity experts in Greece. This study focuses on the current
deepfakes landscape in Greece and examines in detail the current legislation to address
the threat it presents. It also investigates the societal perceptions of the Greek online
community and aims to measure their exposure to malicious deepfakes and the
implications their cybersecurity. In addition, the study contributes to the research on
deepfakes detection by presenting two novel detection methods implemented in Greece.
The findings of this research contribute to a better understanding of this cyber threat.
These results could be taken into consideration by policy and law makers to assess the
level of the deepfake threat in the Greek cyber domain. They also offer a contribution
to the development of a future deepfakes strategy and options for the prevention and
mitigation of malicious deepfakes in the Greek online domain.
This thesis is written in English and is 89 pages long. It includes 9 chapters, 50 figures,
and 77 tables. It also contains 4 Annexes.

Research paper thumbnail of From Terrorism to Cyber-Terrorism: The Case of ISIS

SSRN Electronic Journal, 2018

Research paper thumbnail of Cybersecurity in the EU: Threats, Frameworks and future perspectives

Cybersecurity in the EU: Threats, Frameworks and future perspectives, 2019

For several years now, as technology integrates into our lives, security of individuals, organiza... more For several years now, as technology integrates into our lives, security of individuals, organizational and states is challenged by high-profile cyber incidents. Particularly, as the digital era began, it brought new possibilities and positive prospects for communication, trade and businesses. It provided easier and faster access, alleviated transport and several services. More and more daily activities and transactions are conducted through the use of Internet and technological devices. Soon challenges, threats and risks developed in the cyber space, rooted in the acceleration of technology. Virtual attacks are threatening government institutions, critical infrastructure. Sensitive information or personal data are exposed. The digitalization overall can create more fragile and exposed to dangers societies. Obviously, with the utilization and expansion of cyberspace, its security has been addressed as highly important for governmental and non-governmental actors.
Over the past years, the European Union has acknowledged the increasing threats deriving from the nature of our digitally driven world, the reliance on automation and the connection to data. Thus, the EU wants to take the responsibility of cyber security in its own hands by shaping a comprehensive and integral cyber security strategy for its member states as an effort to strengthen the resilience of cyberspace, mitigate the cyber threats and explore all the benefits of digital transformation.
This paper explores the territory of cyber security in the European Union. In the first place, it reflects on the challenge of defining “cybersecurity” by the European Union. Secondly, it maps the cyber security threats which pressed EU to shape a cyber security strategy. Then, it aims to identify the main cyber security capabilities, frameworks and tools of the EU. The last sectionfeatures the future steps of the European Union towards cyber security and reveals some challenges that the EU member states face in order to achieve a common cyber security policy and cyber security management at the EU level.

Research paper thumbnail of From Terrorism to Cyber-terrorism: The Case of ISIS

Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture ... more Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture to warfare have been cybernized and terrorism does not constitute an exception. From the days of Robespierre to the post 9/11 era, terrorism has been constantly transmuting in context, means and objectives and recently is making its first steps in cyberspace. Exploiting the advantages that this new field of expression, operations and confrontation has to offer like relative anonymity and abundance of easy targets, cyber-terrorism has been added to the cyber-vocabulary. The so-called Islamic State (ISIS) after its phenomenal expansion on the ground has become very active and innovative in the realm of cyber-terror. A number of organizations and individuals have pledged allegiance to ISIS and are employing their cyber-tactics in line with this terrorist organization's cyber-strategy.

Research paper thumbnail of From Terrorism to Cyber-terrorism: The Case of ISIS

Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture ... more Cyber-space is a new battlefield. " Physical " Activities ranging from a simple greeting gesture to warfare have been cybernized and terrorism does not constitute an exception. From the days of Robespierre to the post 9/11 era, terrorism has been constantly transmuting in context, means and objectives and recently is making its first steps in cyberspace. Exploiting the advantages that this new field of expression, operations and confrontation has to offer like relative anonymity and abundance of easy targets, cyber-terrorism has been added to the cyber-vocabulary. The so-called Islamic State (ISIS) after its phenomenal expansion on the ground has become very active and innovative in the realm of cyber-terror. A number of organizations and individuals have pledged allegiance to ISIS and are employing their cyber-tactics in line with this terrorist organization's cyber-strategy.