首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Humans are startlingly bad at detecting fraud. Even when we’re on the lookout for signs of deception, studies show, our accuracy
Humans are startlingly bad at detecting fraud. Even when we’re on the lookout for signs of deception, studies show, our accuracy
admin
2018-02-17
59
问题
Humans are startlingly bad at detecting fraud. Even when we’re on the lookout for signs of deception, studies show, our accuracy is hardly better than chance. Technology has opened the door to new and more pervasive forms of fraud: Americans lose an estimated $ 50 billion a year to con artists a-round the world, according to the Financial Fraud Research Center at Stanford University. But because computers aren’t subject to the foibles of emotion and what we like to call "intuition," they can also help protect us. Here’s how leading fraud researchers, neuroscientists, psychiatrists, and computer scientists think technology can be put to work to fight fraud however it occurs—in person, online, or over the phone.
Spam filters are supposed to block e-mail scams from ever reaching us, but criminals have learned to circumvent them by personalizing their notes with information gleaned from the Internet and by grooming victims over time.
In response, a company called ZapFraud is turning to natural-language analytics; Instead of flagging key words, it looks for narrative patterns symptomatic of fraud. For instance, a message could contain a statement of surprise, the mention of a sum of money, and a call to action. "Those are the hallmark expressions of one particular fraud e-mail," Markus Jakobsson, the company’s founder, told me. "There’s a tremendous number of[spam]e-mails, but a small number of story lines. "
A similar approach could help combat fraud by flagging false statements on social media. Kalina Bontcheva, a computer scientist who researches natural-language processing at the University of Sheffield, in England, is leading a project that examines streams of social data to identify rumors and esti mate their veracity by analyzing the semantics, cross-referencing information with trusted sources, identifying the point of origin and pattern of dissemination, and the like. Bontcheva is part of a research collaboration which plans to flag misleading tweets and posts and classify them by severity: speculation, controversy, misinformation, or disinformation.
Para. 2 suggests that spam filters will function properly if______.
选项
A、scam messages are precisely targeted at their receivers
B、fundamental security breaches are not remedied
C、an exhaustive list of victims is provided to hackers
D、netizens’ privacy is safeguarded against fraudsters
答案
D
解析
推理题。题干“垃圾邮件过滤软件将会正常运转如果……”,第二段提到诈骗分子通过搜集个人信息,发送个性化邮件的形式来进行诈骗。所以[D]“网民的隐私得以被保护不落人骗子的手中”为正确选项。[A]“诈骗邮件被精确地发送给接收者”和[B]“基本的安全漏洞没有被修补”及[C]“详尽的受害者名单被提供给黑客”文章均未提及。
转载请注明原文地址:https://kaotiyun.com/show/DkBZ777K
0
考研英语一
相关试题推荐
OnDrunkDrivingWriteanessayof160-200wordsbasedonthedrawing.Inyouressay,youshould1)describethedrawing
OnFoodSafetyWriteanessayof160-200wordsbasedonthedrawing.Inyouressay,youshould1)describethedrawingb
TheU.S.governmentdroppeditscourtfightagainstAppleafteritsuccessfullypulleddatafromtheiPhoneofSanBernardinog
"Ofthepeople,bythepeople,andforthepeople."That’showAbrahamLincolndescribedtheAmericangovernmentinhisGettysbu
"Ofthepeople,bythepeople,andforthepeople."That’showAbrahamLincolndescribedtheAmericangovernmentinhisGettysbu
"Ofthepeople,bythepeople,andforthepeople."That’showAbrahamLincolndescribedtheAmericangovernmentinhisGettysbu
TheNHSremainsoneofthereasonswhypeopleareproudtobeBritish.Itprovidesoutstandingcaretomorethanamillionofus
Aslongaspeoplehavelookedupatthenightsky,theyhavewonderedwhetherhumanityisaloneintheuniverse.Ofplacesclose
TheU.S.SecretService,whichstudies"targetedviolence",providesinsightontheurgencyoftheneedinits2002"SafeSchool
AreportconsistentlybroughtbackbyvisitorstotheUSishowfriendly,courteous,andhelpfulmostAmericansweretothem.To
随机试题
A、金黄色葡萄球菌B、白色葡萄球菌C、肠道杆菌D、肺炎球菌E、流感嗜血杆菌起病缓慢,全身症状与体征较轻的化脓性脊椎炎致病菌可能是()
在海关监管工作中,为征税提供实际依据,为缉查走私、违法行为提供证据的步骤是()
物业服务企业提供物业服务的项目,一般包括()
2017年6月9日,在哈萨克斯坦首都阿斯塔纳召开的上海合作组织第十七次元首理事会上正式被接受为上海合作组织成员国的是
假定A为一个类,则语句A(A&a);为该类______函数的原型说明。
函数Mid("学生信息管理系统",3,2)的结果是【】。
Monopolisticcompetitiondiffersfromperfectcompetitionprimarilybecause______.
Hereisaneweditionofthedeeplymoving______ofthefive-yearjourneyofphilosopherKenWilberandhiswifethroughherilln
WhenDidAidsBegin?Theyearwas1959.Location:thecentralAfricancityofLeopoldville,nowcalledKinshasa,shortlybef
DowesGinting,themostwantedmanonSumatraIsland,laydying.Hehadabandonedthehospitalwherehehadseenhisrelativess
最新回复
(
0
)