Experts Matter. Find Yours.
Connect for media, speaking, professional opportunities & more.

Baylor Researcher Seeks to Understand the Drive for the Perfect Tan
Despite being one of the most preventable cancers, the desirability of tanning is often stronger than the dangers of harmful UV exposure. Getty Images With summer on the horizon, the quest for the perfect tan has begun. However, there is no such thing as a healthy tan. Despite being one of the most preventable cancers, skin cancer is the most common cancer in the United States, with more than 5 million cases of skin cancer diagnosed each year, according to the Skin Cancer Foundation. Baylor University researcher Jay Yoo, Ph.D., associate professor of apparel merchandising in Baylor’s Robbins College of Health and Human Sciences, found that the social and cultural influences on the desirability of tanning – which has been associated with good health and an active lifestyle since the 1920s – is often stronger than the dangers of harmful UV exposure. “The appeal of a tan is so strong in U.S. culture, it may be difficult for some people to stop or even reduce the amount of tanning,” Yoo said. In his 2019 study, “Identifying factors that influence individuals’ intentions to quit body tanning: A sociocultural perspective,”, published in the international journal Social Behavior and Personality, Yoo identified what motivates people to seek the “perfect” tan. Yoo surveyed 385 college students to understand how society effects their tanning behaviors and intention to quit tanning. His research found that the greatest influence on reducing risky tanning behavior was the perceived attractiveness from tanning, whereas skin-aging concerns positively influence their intention to quit tanning. FINDINGS Yoo’s findings provide important implications for skin cancer prevention campaigns. Instead of promoting the message of body tanning as an unhealthy behavior, focusing instead on untanned healthy bodies as a positive image can serve as an effective approach to decreasing skin cancer incidence. Using messages that accentuate a healthy body without tanned skin should be promoted to boost a positive body image and to reduce the likelihood of engaging in risky tanning behaviors. ACTIONS To protect yourself and look great, the Skin Cancer Foundation recommends: Avoid tanning entirely: It’s the best way to safeguard against unhealthy, unsightly skin damage. Fake, don’t bake: If you want a golden glow, consider sunless tanning products. There are many options, but remember, when in the sun, you still need sun protection. Tone, don’t tan: Get radiant skin through exercise. Working out feels good and boosts your mood. Hydrate and eat great: Drink lots of water and choose whole, unprocessed foods. You don’t need to tan to look slim and your skin will thank you.

Why shoppers are paying more for a fake Amazon discount
By Halle Burton According to new research by Jinhong Xie, a Warrington College of Business professor at the University of Florida, more than a quarter of Amazon vacuum cleaners sold have increased their prices while pretending to offer discounts. Xie’s pricing phenomenon research is joined with Sungsik Park at the University of South Carolina and Man Xie at Arizona State University, publishing their analysis in the Marketing Science journal. A product’s price increase is paired with a previously unadvertised listing price, which encourages Amazon shoppers to receive a deceitful false discount. This faux discount drove higher sales despite the price increase, and shoppers end up paying 23% more on average. “When you see this list-price comparison, you naturally assume you are getting a discount. It’s not just that you didn’t get a discount. You actually paid a higher price than before the seller displayed the discount claim,” said Xie. Regulations currently prohibit deceptive pricing by requiring truthful price comparisons from the sellers, but a list price can still be misleading under these circumstances. Shoppers are misled by the timing of price comparisons where retailers advertise a price discount that actually only gives the impression of a deal. “Current regulations are all about the value of the list price, and they don’t say anything about misleading consumers by manipulating the timing of the list price’s introduction,” Xie said. Xie and her colleagues followed more than 1,700 vacuums on Amazon from 2016 to 2017 gathering observational data on their prices. “We found that by increasing the price by 23% on average, the seller achieves a 15% advantage in their sales rank among all products in the home and kitchen category,” Xie said. Xie encourages consumers to be aware, not make assumptions about discount claims and utilize multiple websites to compare prices. “We think that consumer organizations and regulators should evaluate this new marketing practice to determine whether and how to manage it.”

Cyber threats have become one of the leading issues for corporations, governments, and public institutions across America. With ransomware attacks, hackers, and other nefarious threats, the issue is becoming a daily occurrence and leading news story. Rensselaer Polytechnic Institute’s James Hendler, director of the Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration, weighs in on what we should all know about cybersecurity. Overview Think about cybersecurity the way you think about home security – the more valuables you have, the more security you need. A normal user needs the equivalent of a lock on the door, which most of our computers provide out of the box. However, a user with a fair amount of personal information, who keeps financial records or runs a small business, probably wants a firewall or other additional protection. We used to tell people to protect their computers with firewalls, malware detectors, and the like, but now it is much more important to protect your web access, be wary of external sites, and keep your passwords secure and not easily guessed. Use of a password manager program can be really helpful for people who use a lot of different accounts. Threats The biggest threat facing individuals is identity theft caused by someone getting into an account that you don’t control. Most malware or password stealing comes via a phishing attack (a fake email that convinces you to click a bad link), so if you see an offer that looks too good to be true, don’t believe it. Never give out a password or personal information without confirming that it is legitimate. We also recommend not using major accounts (like Google, Facebook, etc.) to log in to new apps where you aren’t completely sure of the reliability – you’re safer if you use a separate password. It’s also worth noting that these kinds of attacks are now happening on cell phones – if you get a text saying your Amazon, Netflix, or other services have been shut off, be very careful. These companies almost never send out such messages, and if they do, they come via email, not text. For businesses, ransomware is becoming an increasing challenge. Frequent backups and dual authentication are absolute musts for small businesses. Large businesses, and especially those with cyber-physical connections such as a manufacturing device, must have someone on the team who understands internet technology. Outside audits done annually, at least, are also highly recommended. The biggest danger in cybersecurity is that people, especially in businesses, think that the software industry will fix things and that they don’t have to worry. That’s like expecting auto manufacturers to stop car theft, or the government to prevent all crime – these organizations certainly need to help, but they cannot be perfect. So while there definitely needs to be a role for manufacturers and government, people need to understand that the threats are now coming from social interactions such as phishing, or serious criminal enterprises such as ransomware attackers, and not just maladjusted teenagers. They must be ready to pay for some security if they have things on their network that need protection. The Cloud Cloud-based services are a major boon to cybersecurity for individuals and small businesses if, and only if, people protect their access. If a breach is reported to you by a company, don’t ignore it, change your password, and, whenever possible, use dual authentication. The cloud companies can afford to spend more on security than you can and thus your information stored in these services tends to be quite secure. However, people need to be careful in using the cloud. Just as you may trust a bank with your money, you want to be sure not to be robbed on your way there. Future Computing Systems and Cybersecurity New technologies, such as artificial intelligence (AI), are arising all the time in today’s fast-moving cyber world. As these technologies arise, they can create new opportunities for cybersecurity, but can also create new challenges. Cybercrime will never disappear, and each new capability comes with a price. Increased education and awareness of emerging computing technologies (blockchain, quantum, etc.) are important not just for the expert, but also for the general public. It is important to stay informed and pay attention to what is being reported. Just as buying a new appliance can be a great advantage at home (I love my new air-fryer), you also have to be sure to be using it appropriately (used wrong, it can cause fires). Looking to learn more or connect with an expert for your questions and coverage? James Hendler is the director of the Rensselaer Future of Computing Institute, Tetherless World Professor of Computer, Web, and Cognitive Sciences, and director of the RPI-IBM Artificial Intelligence Research Collaboration. Hendler has authored over 400 books, technical papers, and articles in the areas of Semantic Web, artificial intelligence, cybersecurity, and high-performance processing. Hendler is available to speak with media - simply click on his icon now to arrange an interview today.

Are You an Expert? Here’s How to Tell
Have you ever wondered whether or not you are an expert? When asked this question about what defines expertise, you will hear a variety of answers. Many will reference key requirements such as an expert must have extensive knowledge in their field. Others will see education, published work, or years of experience as key qualifiers. Yet there are so many other dimensions of expertise that contribute to how visible, influential and authoritative they are within their community of practice or with the general public. Who Qualifies as an Expert? I started looking closer at this topic for two reasons. The first is my personal work with experts. Having worked with thousands of them across a variety of sectors I've observed that many are driven to develop themselves professionally as an expert to meet a variety of objectives. Often these are focused on raising one's profile and reputation among peers or with the broader market to inform the public. Some see media coverage being an essential part of their strategy while others are more interested in developing a larger audience for their research or client work, by speaking at conferences or on podcasts. Others have a focus on improving their PageRank on search engines. All these activities can enable important objectives such as attracting new clients, research funding or talent. The second reason for this deeper dive into expertise is a need to better organize how we look at experts within organizations. My work with communications departments in knowledge-based sectors reveals that they are keen to learn more about how they can better engage their experts to build reputation, relationships and revenue. However, better engagement starts with a better understanding of what qualifies someone as an expert - what attributes can we objectively look at that define expertise? With that knowledge, we can first better appreciate the amount of work experts have put into establishing themselves in their field. Then organizations can nurture this expertise in a more collaborative way to accomplish shared goals. My observation is that with a little more insight, empathy, and alignment, both experts and their organizations can accomplish incredible things together. And there has never been a more important time for experts to "show their smarts." By definition, an expert is someone with comprehensive or authoritative knowledge in a particular area of study. While formal education and certifications are a starting point for expertise, many disciplines don’t have a set list of criteria to measure expertise against. It’s also important to recognize other dimensions of expertise that relate not just to the working proficiency in a field but also to the degree of influence and authority they have earned within their profession or community of practice. Because of this, expertise is often looked at as a person’s cumulative training, skills, research and experience. What are the Key Attributes of Expertise? In evaluating your accomplishments and the various ways you can contribute as an expert to both your community of practice and the public, here are some key questions that can help you assess how you are developing your expertise: Have you completed any formal education or gained relevant experience to achieve proficiency in your chosen field? Are you actively building knowledge in a specific discipline or practice area by providing your services as an expert? Are you generating unique insights through your research or fieldwork? Are you publishing your work to establish your reputation and reach a broader audience such as publications or books? Are you teaching in the classroom or educating and inspiring audiences through speaking at conferences? Do you demonstrate a commitment to impact your community of practice and help advance your field and generate an impact on society by informing the public? Have you established a reputation as a go-to source for well-informed, unique perspectives? Some Additional Tips to Help you Develop Your Expertise To further the discussion, I’ve also shared further thoughts about the meaning of “expertise”. As you think about developing your own personal skills, or if you are a communicator who is responsible for engaging with your organizations experts, here are a few additional principles to keep in mind. Experts Aren't Focused on Some“Magic Number” Related to Hours of Experience Malcolm Gladwell’s book “Outliers” (2008), outlined the now famous “10,000-hour rule” as the magic number of greatness for the time it takes to master a given field. As the rule goes, you could become a genuine expert in a field with approximately 10,000 hours of practice — roughly 3 hours a day, every day for a consecutive decade. But is that what it really takes to become an expert? But is that what it really takes to become an expert? Or did Gladwell oversimplify the concept of expertise? Some of his assumptions for “Outliers” (which became a major bestseller) relied on research from Dr. Anders Ericsson at Florida State University who made expertise the focus of his research career. Contrary to how Gladwell outlined it, Ericsson argued that the way a person practised mattered just as much, if not more, than the amount of time they committed to their discipline. It also depends on the field of research or practice one is involved in. Some disciplines take decades to achieve expertise and many experts will admit they are just scratching the surface of what they are studying, well after they have passed the 10,000-hour mark. That might be just the first stage of proficiency for some disciplines. Experts are Continuously Learning It’s difficult to claim proficiency as an expert if you are not staying current in your field. The best experts are constantly scouring new research and best practices. Dr. Anders Ericsson observed in his work that "deliberate practice" is an essential element of expertise. His reasoning was that one simply won’t progress as an expert unless they push their limits. Many experts aren’t satisfied unless they are going beyond their comfort zone, opening up new pathways of research, focusing on their weaknesses, and broadening their knowledge and skills through avenues such as peer review, speaking, and teaching. The deliberate practice occurred “at the edge of one’s comfort zone” and involved setting specific goals, focusing on technique, and obtaining immediate feedback from a teacher or mentor. Experts Apply their Knowledge to Share Unique Perspectives While many experts conduct research, simply reciting facts isn't enough. Those who can provide evidence-based perspectives, that objectively accommodate and adapt to new information will have more impact. Expertise is also about developing unique, informed perspectives that challenge the status quo, which can at times be controversial. Experts know that things change. But they don’t get caught up in every small detail in ways that prevent them from seeing the whole picture. They don't immediately rush toward new ideas. They consider historical perspectives and patterns learned from their research that provide more context for what's happening today. And these experts have the patience and wisdom to validate their perspectives with real evidence. That's why expert sources are so valuable for journalists when they research stories. The perspectives they offer are critical to countering the misinformation and uninformed opinions found on social media. Experts Connect with a Broader Audience Many experts are pushing past traditional communication formats, using more creative and visual ways to translate their research into a wider audience. We conducted research with academics in North America and in Europe who are trying to balance their research (seen in traditional peer-reviewed journals) with other work such as blogs, social media, podcasts and conferences such as TEDx - all with the goal to bring their work to a wider audience. While that's an essential part of public service, it pays dividends for the expert and the organization they represent. Experts Are Transparent More than ever, credible experts are in demand. The reason for this is simple. They inspire trust. And the overnight success some have seemingly achieved has come from decades of work in the trenches. They have a proven record that is on display and they make it easy to understand how they got there. They don't mask their credentials or their affiliations as they didn't take shortcuts. They understand that transparency is a critical part of being seen as credible. Experts Don’t Take “Fake It Till You Make It” Shortcuts The phrase “fake it till you make it,” is a personal development mantra that speaks to how one can imitate confidence, competence, and an optimistic mindset, and realize those qualities in real life. While this pop psychology construct can be helpful for inspiring personal development, it gets problematic when it becomes a strategy for garnering trust with a broader audience to establish some degree of authority - especially when this inexperience causes harm to others who may be influenced by what they see. When self-appointed experts take shortcuts, promoting themselves as authorities on social media without the requisite research or experience, this blurs the lines of expertise and erodes the public trust. Experts Are Generous The best experts are excited about the future of their field, and that translates to helping others become experts too. That's why many openly share their valuable time, through speaking, teaching and mentorship. In the end, they understand that these activities are essential to developing the scale and momentum necessary to tackle the important issues of the day. How Do You Show your Smarts? How do you personally score on this framework? Or if you are in a corporate communications or academic affairs role in an institution how does this help you better understand your experts so you can better develop your internal talent and build your organization’s reputation? As always we welcome your comments as we further refine this and other models related to expertise. Let us know what you think. Helpful Resources Download our Academic Experts and the Media (PDF) This report, based on detailed interviews with some of the most media-experienced academics across the UK and United States draws on their experiences to identify lessons they can share in encouraging other academics to follow in their path. Download the UK Report Here Download the US Report Here The Complete Guide to Expertise Marketing for Higher Education (PDF) Expertise Marketing is the next evolution of content marketing. Build value by mobilizing the hidden people, knowledge and content you already have at your fingertips. This win-win solution not only gives audiences better quality content, but it also lets higher ed organizations show off their smarts. Download Your Copy

Social media interaction and well-being during a public health crisis
Yvette Wohn, assistant professor at New Jersey Institute of Technology, examines how social media and mobile technologies are used for social support, which includes emotional, informational and financial support — managing both personal and professional relationships. Wohn‘s research area is in human-computer interaction (HCI) and computer-mediated communication. She studies the role of algorithms and social interactions in livestreaming, esports and social media and how they influence well-being. Wohn is conducting research on how physical and social space influences the well-being and productivity of people living or working in enclosed spaces. Some of her experiments look at the effects of simulated nature via digital windows. As Wohn notes, "Seeing nature is important to maintain well-being. In a nutshell, seeing nature on a big screen, even if you know it is fake, can help elevate mood." Wohn is also the principal investigator of two NSF-funded projects examining the role of content moderators on social media, whose role is to keep online spaces positive and factual. Wohn is available to speak with media on topics related to how people use different technologies and social media to connect during these times. To request an interview, click on the button below.

How to protect yourself against financial fraud as a newcomer in Canada
As a newcomer in Canada, your financial security is of prime importance. However, fraudsters and scammers recognize that newcomers can be easy targets, as they don’t necessarily have the information needed to protect themselves against fraud. Being in a new country, you may not be aware of the ways in which financial fraud occurs, how to identify fraudulent situations, or where to report fraud. This article gives you an overview of the various types of financial fraud and scams that occur in Canada and provides valuable tips to help protect you against financial fraud as a newcomer. Recognizing common financial fraud and scams in Canada Phishing emails or text messages Phishing emails or text messages are often designed to look like they are from a source or website you trust, like your bank or an online store. The sender will ask you to click on a link or download a file, or will try to create a sense of urgency, such as saying there has been some suspicious activity from your account or that you need to update your payment information to keep your account active. Be sure to check the email address the email originated from. If the domain name doesn’t match the organization’s name, it’s likely a phishing attempt. Other red flags can be bad grammar, a generic greeting, or unsolicited attachments in the message. If you suspect that an email or text is fraudulent, call the organization to verify before clicking on any links or sharing any personal information. Generally, Canadian banks will never ask you to share personal information, such as account numbers or Social Insurance Number (SIN), over email or text message. Debit or credit card fraud Debit or credit card fraud happens when someone steals your credit card, PIN, or bank card information and uses it to make purchases or withdrawals from your account. Fraudsters can use different ways to get your credit card information, including stealing bank statements from your mailbox or garbage, hacking into company databases to steal information, prompting you to use your credit card on a fake website, or through phishing emails. You can prevent debit and credit card fraud by keeping your credit card and personal information safe. Check your bank statements or banking app regularly to ensure that you can identify all the transactions. If you think you have been a victim of credit card fraud, call the phone number on the back of your credit card immediately to get in touch with your bank and lock your card to avoid additional fraud. Immigration and citizenship fraud There are several private immigration consulting organizations that specialize in helping newcomers come to Canada. However, if you come across a website that asks you to pay for immigration or application forms or guides that are otherwise available for free on the Immigration, Refugees, and Citizenship Canada (IRCC) website, it might be fraudulent. You may also receive fraudulent phone calls or emails from someone posing as an immigration or citizenship service provider, claiming that they can guarantee entry into Canada, provide jobs, or fast-track your immigration processing for a fee. Never share your financial details with such organizations without contacting the website owner and checking online reviews to confirm the legitimacy of the business. Also, learn about the immigration and citizenship process so you can identify fake claims. Employment fraud While looking for a job as a newcomer in Canada, be on your guard against fake “employment agencies” who ask you to pay for “training” in order to get a job or promise you a guaranteed job if you pay a large upfront fee. Legitimate recruiters or agencies in Canada will never guarantee job placements or force you to undergo mandatory training. Typically, when employers use external recruiters or agencies to find candidates, the organization, not the candidate, pays the agency’s fee. Fake phone calls from “CRA” or tax fraud Many newcomers receive fraudulent phone calls from someone claiming to be from the Canada Revenue Agency (CRA) or Service Canada. Typically, the caller (or recorded message) will state that you have unpaid tax liabilities or that your Social Insurance Number (SIN) has been compromised. In some instances, scammers may even claim there is a warrant out for your arrest, which can be quite alarming. They may ask you to share your SIN number or make a payment through wire transfer, bitcoin, or prepaid gift cards. These callers are often aggressive and use threatening language to scare the recipient. In a variation of this type of fraud, the caller (supposedly the CRA) will claim that you’re entitled to a tax refund and will need to share your banking information to get it. The CRA typically contacts individuals by message in their secure online portal, so if there is an issue with your tax return, you will see a message about it there. If you’re unsure about the legitimacy of a call, hang up and call the agency to verify its authenticity. Educate yourself on the ways legitimate government agencies can contact you and the questions they may ask. Pyramid or Ponzi schemes A pyramid scheme is a business model where you’ll be offered payment or commission for enrolling other members, rather than for selling actual products or services. You’ll be asked to pay an upfront “membership fee,” with promises of being able to turn a profit once you start bringing in more members. A Ponzi scheme is a type of fraud where you’re lured into investing money with the promise of very attractive dividends. In reality, your money is not being invested anywhere and is instead being used to pay “dividends” to other investors. Investors may receive lucrative dividends for some time until the pool of new investors dries up. If the promised returns seem too good to be true, it may be a Ponzi scheme. Be sure to carefully vet investment opportunities or speak to your financial advisor before making any investments. Catphishing or romance fraud If you’re active on dating sites or apps, keep an eye out for romance fraud. Catphishing, or catfishing, is when a person pretends to be someone else online, using a fake name, photograph, or story. A fraudster may spend time talking to you online, and once they’ve established a romantic connection, they’ll ask you for money, claiming that they need it to help a sick relative or get over a bad stretch. In some cases, the scammer may even meet you in person to make the relationship seem more legitimate. Fake computer virus or ransomware In this type of scan, the victim gets a call or email claiming that their computer has been infected with a virus. The scammer may ask for money to remove the virus or could try to access personal information and passwords through their device. Be sure to install an anti-virus to protect your laptop and mobile device. Fake prizes If you receive a message, email, or phone call saying you’ve won a prize for something you don’t remember participating in, it’s probably a scam. Fraudsters may use this opportunity to collect your personal information or verify your contact details, so avoid responding to such messages or sharing any information. If you’re unsure about the legitimacy of the prize, check the organization’s website to confirm whether the contest or offer is real. Tips to protect yourself against financial fraud as a newcomer Financial fraud can impact your financial stability and, as a newcomer, it’s important to safeguard yourself against potential threats and fraudulent activities. Here are some key things you should keep in mind to protect yourself against financial fraud: Keep close track of finances. Review your bank account, credit card statements, and credit report regularly and report any inconsistencies early. If you’re unsure about what to look for, speak to a financial advisor for more information. Protect your personal and financial information. Change your banking passwords often and don’t write them down. Keep your credit card and credit card information safe, and don’t use your credit card on untrustworthy websites. Don’t share your personal or financial information, including your SIN, unless you know why it’s needed and how it will be used. Educate yourself on who can ask for your SIN or credit history, and only share this information if it’s absolutely necessary. Learn to identify fraud. If an offer seems too good to be true, it’s likely fraudulent. Always review the terms and conditions of the service or financial product you’re purchasing before making any payments. Borrow only from trustworthy financial institutions. Credit is an essential part of Canada’s financial ecosystem. Financial institutions like banks, credit unions, mortgage providers can provide you with credit to cover your expenses. Avoid going to illegitimate local lenders or payday loan providers as they could misuse your financial information or lead you into debt. Verify suspicious phone calls or emails and report fraud. If you’re unsure about the legitimacy of an email or call you received, check for signs of phishing or contact the organization or agency to verify whether the information is accurate. Don’t share your financial or personal information with anyone or click on any links until you’ve verified the authenticity of the message. If you suspect that you’ve received a fraudulent phone call or email, report it to the Canadian Anti-Fraud Centre by telephone at 1-888-495-8501, through their website, or by email (info@antifraudcentre.ca). If your SIN has been stolen, report it to Service Canada at 1-866-274-6627 as soon as possible. Keep your laptop and mobile devices safe. Never give physical or virtual access to your devices to someone who isn’t an authorized service professional or someone you didn’t contact for service or repair. Your devices may contain saved passwords, login details, or other personal information that fraudsters can extract and misuse. Always wipe your devices by restoring factory settings before selling or scrapping used laptops or mobile phones. As a newcomer in Canada, receiving phone calls from someone posing as a CRA official can be alarming. By learning to recognize common financial scams and verifying potentially fraudulent claims, you can safeguard yourself against fraud. Remember, by reporting fraudsters, you are protecting not just yourself but also countless others who may otherwise be targeted by financial scams. Original article located here, published by Arrive. About Arrive Arrive is powered by RBC Ventures Inc, a subsidiary of Royal Bank of Canada. In collaboration with RBC, Arrive is dedicated to helping newcomers achieve their life, career, and financial goals in Canada. An important part of establishing your financial life in Canada is finding the right partner to invest in your financial success. RBC is the largest bank in Canada* and here to be your partner in all of your financial needs. RBC supports Arrive, and with a 150-year commitment to newcomer success in Canada, RBC goes the extra mile in support and funding to ensure that the Arrive newcomer platform is FREE to all. Working with RBC, Arrive can help you get your financial life in Canada started – right now. Learn about your banking options in Canada and be prepared.

Christmas is here! And with the hustle and bustle of shopping and scouring the internet for that perfect gift or deal, odds are there are people lurking in the dark corners hoping to stuff their stockings with scams if you’re not too careful. At Thanksgiving, when the official start to the shopping season began – the experts from Indiana University’s Kelley School of Business were front and center answering media calls and doing interviews about this very topic Scott Shackelford, a professor at Indiana University specializing in cyber security, said there are some red flags to be on the lookout for while shopping online. “There’s some easy ones to spot right off the bat, including if on the URL,” said Schackelford. “If you see it just as HTTP and not HTTPS. That S stands for secure, which means your information is encrypted when you use that site.” Shackelford also said to be on the lookout for funny wordplay involved on the website. Maniscalo says most of these fake websites originate from outside the country. “English is not their native tongue, so they will a lot of times have misspellings, or say things in kind of an awkward way, not how we would say it, or how we would print it out there,” said Maniscalo. There is also the problem of what Shackelford calls Grinch Bots. These are automated bots that monitor major retail sites to see what items are the hottest and buy them out as soon as they are restocked. “There’s actually been bills that have been proposed in Congress to deal with example of that phenomenon. But of course, they’re not enacted yet, so it’s still up to consumers,” said Shackelford. November 25 – Fox News It’s going to be a busy holiday shopping season – and if you’re a journalist looking to cover this important top, then let us help. Scott Shackelford is an Assistant Professor of Business Law and Ethics at Indiana University’s Kelley School of Business. He’s an expert in the field of cybersecurity law and policy. Scott is available to speak with media about this subject – simply click on his icon now to arrange an interview today.

Victory for Kim Leadbeater, relief for Keir Starmer. Peter Byrne/PA Images/Alamy Stock Photo Parveen Akhtar, Lecturer in Political Science, Aston Centre for Europe at Aston University, dissects the close vote. The Batley and Spen by-election was a close contest that went right down to the wire with few commentators risking calling the result before it was announced. At 5:25am it was declared. Kim Leadbeater was the new Labour MP for Batley and Spen, beating her nearest rival, the Conservative candidate Ryan Stephenson, by 323 votes. It was close but a clear victory for Labour. Leadbeater’s acceptance speech was always going to be poignant. This was the seat held by her older sister, Jo Cox, at the time of her murder in 2016. Cox, who won the seat for Labour in 2015, was killed by a terrorist who held extreme right-wing views and targeted Cox because of her work with refugees. But what was striking – if also sobering and shocking in equal measure given the context – was that Leadbeater also had recourse to thank West Yorkshire police for their protection of her during the campaign. “Sadly”, she said, “I have needed them more than ever.” In fact, even before her victory had been declared, she released a statement pointing to the “intimidation and violence of those who had convened in the constituency with the sole aim of sowing division”. Discord, division and dirty tricks A total of 16 candidates put their hats in the ring for the race in Batley and Spen – a number of whom represented far-right political parties. But it was the presence of George Galloway standing as an independent for the Workers Party which seriously threatened to undermine Labour’s chances of retaining the seat it had held since 1997. Galloway was determined to woo traditional Labour supporters, including the significant Muslim constituent in Batley and Spen. Capitalising on escalating tensions in the Middle East, Galloway sought to paint the Labour leader Sir Keir Starmer as anti-Muslim. His intention was to set up the vote as a referendum on Starmer’s leadership, to split the Labour vote and ultimately force Starmer out of office. To this end, he also attempted to attract white working-class voters by building a narrative of the Labour leader as “woke” rather than for the working class. In the run-up to July 1 there were deeply disturbing reports coming out of Batley and Spen detailing the intimidation and abuse of candidates. There were accusations of dog-whistle racism and homophobia, fake leaflets and foul play. The campaign descended into one of the most bitter and divisive by-elections of recent years. Tracy Brabin, who had won the seat after the murder of Cox and whose win in the West Yorkshire mayoral election triggered the by-election, described witnessing her group of canvassers “being egged, pushed and forced to the ground and kicked in the head”. It was by no means the only time such disturbing strategies have been exploited. In fact, similar divisions were present in the 2015 general election in Bradford West, an election in which Galloway was again present, this time fighting to retain his seat. At a hustings at the university, the then conservative candidate, George Grant, captured the “wild west” nature of the campaign by likening it to a 19th-century rotten borough rather than a 21st-century parliamentary democracy. That election too descended into discrediting individuals and delving into their private lives rather than concentrating on the issues faced by people on the ground. Changing nature of campaigns Electioneering is by its very nature divisive, effectively asking the electorate to vote for party or candidate A and not party or candidate B. But dirty tricks or underhand tactics used to discredit opponents are by no means inevitable. And yet, while the notion of a sense of fair play and decency may be engraved in the nation’s idea of itself, the 2019 general election demonstrated how easy it is to resort to electioneering in bad faith in the age of social media. From faking fact checks to manipulating videos, the 2019 election threw up a whole catalogue of ways in which to unduly undermine political opponents. Indeed, divisive and personal campaigns may become more prevalent in an era of online campaigning. Something not unique to the UK, of course. The 2020 US presidential election was also divisive in nature as were the state elections in India’s West Bengal earlier this year. In Batley and Spen, in the end, as the Leadbeater pointed out in her speech, the people voted for hope not hate. Yet the constituency is deeply divided and will take much work to bring together. Leadbeater was the only major candidate on the ballot box who was local to the area. While the others leave, she remains, in her words, “the best person” to get on with the job of reconciliation.

Best-selling author Peter Singer talks with the Brunswick Review about winning the increasingly crowded and contentious war for attention What do Isis and Taylor Swift have in common? According to author and digital-security strategist Peter Singer, both the terrorist organization and pop star are fighting for your attention online and employing similar tactics to try and win it. ISIS kicked off its 2014 invasion of Mosul with the hashtag, “#AllEyesonISIS.” More recently, the terror group posted photos of its members holding cute cats in an effort to make them more relatable – tactics familiar to most celebrities and online marketers around the world. These online battles, the rules governing them, and their real-world impact are the focus of Mr. Singer’s latest book, LikeWar, which he coauthored with Emerson T. Brooking, at the time a research fellow with the Council of Foreign Relations. “A generation ago people talked about the emergence of cyber war, the hacking of networks. A ‘LikeWar’ is the flip side: the hacking of people and ideas on those networks. Power in this conflict is the command of attention,” says Mr. Singer, who in addition to his writing is also a strategist and Senior Fellow at the New America Foundation. Pretty much everyone who posts online – from governments to marketers to reality TV stars – is a combatant in this fight for virality, according to Mr. Singer. Triumph in a “LikeWar” and you command attention to your product or propaganda or personality. Lose and you cede control of the spotlight and the agenda. Mr. Singer recently spoke with Brunswick’s Siobhan Gorman about the trends he’s seeing in LikeWars around the world, and what companies can do to avoid being on the losing end. What were you most surprised by in researching LikeWar? One of the more interesting characters in the book was at one time voted TV’s greatest villain: Spencer Pratt, a reality TV star on MTV’s “The Hills.” He’s basically one of these people who became famous almost for nothing. But what Pratt figured out really early was the power of narrative, which allowed him to become famous through, as he put it, “manipulating the media.” In the same week, I interviewed both Pratt and the person at the US State Department who’s in charge of the US government’s efforts to battle ISIS online. And Pratt, this California bro who’s talking about how to manipulate the media to get attention, understood more of what was playing out online than the person at the State Department. Spencer Pratt, a reality TV star… understood more of what was playing out online than the person at the State Department.” How much have online conflicts changed the rules in the last few years? First, the internet has left adolescence. It’s only just now starting to flex its muscles and deal with some of its responsibilities. The structure of the network changes how these battles play out. So, it’s this contest of both psychological but also algorithmic manipulation. What you see go across your screen on social media is not always decided by you. The rule makers of this global fight are a handful of Silicon Valley engineers. Another aspect of it is that social media has effectively rendered secrets of any consequence almost impossible to keep. As one CIA person put it to us, “secrets now come with a half-life.” Virality matters more than veracity; the truth doesn’t always win out. In fact, the truth can be buried underneath a sea of lies and likes. And the last part is that we’re all part of it. All of our decisions as individuals shape which side gets attention, and therefore which side wins out. But you highlight that this is playing out differently in China. Exactly. There are two different models shaping the internet, and shaping people’s behavior through the internet, playing out in the West and in China. Essentially, internet activity in China is all combined. Look at WeChat, which is used for everything from social media to mobile payment; it’s Amazon meets Facebook meets Pizza Hut delivery. And you combine that with an authoritarian government that’s had a multi-decade plan for building out surveillance, and you get the social credit system, which is like Orwellian surveillance crossed with marketing. The social credit system allows both companies and the government to mine and combine all the different points of information that an online citizen in China reveals of themselves, and then use that to create a single score – think of it as your financial credit score of your “trustworthiness.” For example, if you buy diapers your score goes up, because that indicates you’re a parent and a good parent. If you play video games for longer than an hour your score goes down because you’re wasting time online. And it’s all networked. Your friends and family know your score. It creates a soft form of collective censorship; if your brother posts something that’s critical of the government, you’re the one who goes to him and says, “Knock it off ’cause you’re hurting my score.” And you do that because the score has real consequences. Already it’s being used for everything from seating on trains and job applications to online dating. Your score literally shapes your romantic prospects. So, you have this massive global competition between Chinese tech companies and other global tech companies not only for access to markets, but also for whose vision of the internet is going to win out. How can companies win a “LikeWar”? Everyone’s wondering: What are the best ways to drive your message out there and have it triumph over others? The best companies I’ve seen create a narrative, have a story and have emotion – in particular, they have emotion that provokes a reaction of some kind. It’s all about planned authenticity. That sounds like a contradiction, but it’s about acting in ways that are genuine, but are also tailored because you’re aware that the world is watching you. A good comparison here is Wendy’s versus Hillary Clinton. Wendy’s is a hamburger chain – not a real person – but it acts and comes across as “authentic” online and has developed a massive following. They’re funny, irreverent. Yet Hillary Clinton – a very real person – never felt very authentic in her online messaging. And that’s because it involved a large number of people – by one account, 11 different people – all weighing in on what should be tweeted out. Inundation and experimentation are also key. Throwing not just one message out there, but massive amounts of them. Treating each message as both a kind of weapon, but also an experiment that allows you to then learn, refine, do it again, do it again, do it again. How do you measure and gauge battles online now? Is it just volume? It all depends on what your battle is, what your end goal is. Is it driving sales? Is it getting people to vote for you, to show up to your conference? This is what the US gets wrong about Russian propaganda and its disinformation campaigns. We think they’re designed to make people love or trust a government. From its very start back in the 1920s, the goal of propaganda coming from the Soviet Union, and today Russia, has been instead to make you distrust – distrust everything, disbelieve everything. And we can see it’s been incredibly effective for them. First, we need to recognize that we’re a part of the battle. In fact, we’re a target of most of the battles. How effective have disinformation campaigns actually been in the US? What can be done? One of the scariest and maybe saddest things we discovered is that the US is now the story that other nations point to as the example of what you don’t want to have happen. There’s no silver bullet, of course. But one example was something called the Active Measures Working Group, a Cold War organization that brought together the intelligence community, diplomats and communicators to identify incoming KGB disinformation campaigns and then develop responses to them. We’re dealing with the modern, way more effective online version of something similar, and we haven’t got anything like that. There are also digital literacy programs. I find it stunning that the US supports education programs to help citizens and kids in Ukraine learn about what to do and how to think about online disinformation, but we don’t do that for our own students. What can people like you or me do? First, we need to recognize that we’re a part of the battle. In fact, we’re a target of most of the battles. And we need to better understand how the platforms work that we use all the time. A majority of people actually still don’t understand how social media companies make money. The other is to seek out the truth. How do we do that? And the best way is to remember the ancient parable of the blind man and the elephant – don’t just rely on one source, pull from multiple different sources. That’s been proven in a series of academic studies as the best way to find the facts online. It’s not exactly new, but it’s effective. Where will the next online war be fought? The cell phone in your pocket, or if we’re being futuristic, the augmented reality glasses that you wear as you walk down the street. It’ll come from the keepsake videos that you play on them. If you want to know what comes next in the internet there have always been two places to go: university research labs and the porn industry. That’s been the case with webcams, chat rooms and so on. What we’re seeing playing out now are called “deep fakes,” which use artificial intelligence to create hyper-realistic videos and images. There’s also “madcoms,” which are hyper-realistic chat bots that make it seem like you’re talking to another person online. Combine the two, and the voices, the images, the information that we’ll increasingly see online might be fake, but hyper-realistic. The tools that militaries and tech companies are using to fight back against the AI-created deep fakes are other AI. So, the future of online conflict looks like it’ll be two AIs battling back and forth. Let me give you a historic parallel, because we’ve been dealing with these issues for a very long time. The first newspaper came when a German printer figured out a way to monetize his press’s downtime by publishing a weekly collection of news and advice. And in publishing the first newspaper, he created an entire industry, a new profession that sold information itself. And it created a market for something that had never before existed – but in creating that market, truth has often fallen by the wayside. One of the very first newspapers in America about a century later was called the New England Courant. It published a series of letters by a woman named Mrs. Silence Do-good. The actual writer of the letters was a 16-year-old apprentice at the newspaper named Benjamin Franklin, making him the founding father of fake news in America. In some sense it’s always been there, using deception and marketing to persuade people to your view.

What's in a name? Ghoshal finds hiring discrimination persists
New research by an Elon University professor is challenging earlier findings related to hiring discrimination against African American job candidates. A new article by Raj Ghoshal, assistant professor of sociology, addresses a debate over whether employers still illegally discriminate when making hiring decisions, and supports the idea that discrimination persists. His article “Flawed Measurement of Hiring Discrimination against African Americans,” appears in the Fall 2019 issue of the peer-reviewed journal Sociation. In the article, Ghoshal draws upon his own research to argue that earlier claims that employers no longer discriminate have been invalidated, and that if that earlier research was properly interpreted, it means black job applicants need to send out about 50 percent more applications as white applicants to have an equal chance at getting a response. Many experiments in the past 15 years have tested for discrimination by creating two fake identities with equal-quality resumes and applying to the same set of job listings with both identities. Ghoshal's findings address methodological issues in these experiments, some of which have claimed that hiring discrimination based on race has disappeared. In these previous experiments known as audit studies, “Steven Smith” and “DeShawn Jackson” might apply to the same 1,000 jobs. Researchers then measure how much interest each resume generates. This line of research has generally found that black Americans need to send out significantly more applications than white Americans to get the same number of callbacks. A 2016 study by economists at the University of Missouri-Columbia argued that these studies used overly stereotypical names to signal race in ways that exaggerated their results. The economists conducted their own study using what they considered more realistic names, and found no difference in employers’ response rates by race. But Ghoshal’s work finds significant flaws in the methodology the economists used. The 2016 study had used names like “Chloe Jackson” and “Ryan Washington” for their African American job candidates because the last names Jackson and Washington typically belong to black individuals, while “Chloe” and “Ryan” were purportedly race-neutral. Though the economists are correct to see Washington and Jackson as typically black last names, Ghoshal hypothesized that very few Americans would know this and interpret the names as intended. He therefore conducted a 1,050-person national survey which asked respondents to guess the race of people with the exact names the 2016 study had used. Survey findings show that about 60 percent of people do not interpret the economists’ study names as intended, and frequently see the names as belonging to white individuals. Further, those individuals most likely to make hiring decisions make just as many errors as others. The level of error is sufficient that the 2016 study is not merely invalidated. Rather, its results, properly interpreted, suggest that black job applicants need to send out about 50 percent more applications to have an equal chance of response. Overall, the findings suggest that racial discrimination remains an important concern that individuals, employers, and government should address. If you're interested in talking with Professor Ghoshal as you continue to cover this important topic, please reach out to Owen Covington, director of the Elon University News Bureau, at ocovington@elon.edu or (336) 278-7413. Professor Ghoshal is available for phone, email and broadcast interviews.










