Papers by Dinusha Vatsalan

Researchers are concerned about the impact of fake news on democracy, while it could also escalat... more Researchers are concerned about the impact of fake news on democracy, while it could also escalate to life-threatening problems. Fake news continues to spread, so does people's behaviour and emotions about fake news via social media. This opens up the back door for cyber-criminals to entice people (i.e. taking advantage of victims' emotional and behavioural aspects) to click on fraudulent links (e.g. phishing links) associated with fake news when reading. Therefore, we investigate how people's emotional and behavioural features influence reading and diffusing fake news on social media. We proposed a classification model incorporating people's behavioural features and their emotions to better detect fake news in social media. Our results reveal that fake news has more negative emotions than legitimate ones and both title and the content of the news/posts are equally important. Furthermore, we have identified that there exist strong correlations between some of the beh...

Security and Privacy, 2021
It is a known fact that cybercriminals often manipulate people to steal sensitive information. Ho... more It is a known fact that cybercriminals often manipulate people to steal sensitive information. However, there has been a lack of research in investigating cybercriminals' strategies and the evolution of strategies when crafting phishing emails to entice people to perform a variety of malicious tasks such as clicking on fraudulent links. This study uses a combination of Natural Language Processing (NLP), topic modeling, and clustering techniques to analyze and evaluate the persuasive techniques/strategies, which cybercriminals use when crafting fraudulent emails. Our experimental results revealed the efficacy of using these techniques in understanding cybercriminals' mindset as well as how certain aspects of these techniques maintained consistency despite the evolution of the strategy from early Nigerian scams to more modern phishing emails. The findings of our study indicate that the most common technique/strategy used by cybercriminals is a combination of creating a sense of urgency while promising a reward. Moreover, despite the evolution of technology, cybercriminals are still effectively using the same persuasive techniques. Based on our findings, we provided several recommendations to improve anti-phishing software and awareness and training programs.
Mobile Technologies for Enhancing eHealth Solutions in Developing Countries
2010 Second International Conference on eHealth, Telemedicine, and Social Medicine, 2010
The high penetration of mobile devices and networks globally implies that mobile technologies can... more The high penetration of mobile devices and networks globally implies that mobile technologies can be used very effectively in the field of Healthcare in order to compensate the scarcity of resources problem, particularly in developing countries. With the proliferation of mobile technologies, mobile health (mHealth) will play a vital role in the rapidly growing electronic health (eHealth) area. The form

Sri Lanka Journal of Bio-Medical Informatics, 2012
Patients in rural areas in developing countries have less access to specialised consultations wit... more Patients in rural areas in developing countries have less access to specialised consultations within their hometown. They are required to incur a great cost, time and effort to reach a Health Institute that provides specialised health care. Yet, it is discovered that through the utilisation of comparatively cheaper Information and Communication Technology advances, it is possible to provide better health services for developing regions. The healthcare delivery setting in rural parts of Sri Lanka today exposes limited access to highly specialised consultancies. It is stated that 35 per cent of the medical specialists in the curative sector are concentrated in the Colombo district. A pilot project funded by the Information and Communication Technology Agency of Sri Lanka (ICTA) was initiated connecting the Marawila Base Hospital and Dankotuwa Peripheral hospital which is situated around 33 miles away from Colombo in the NorthWestern province of Sri Lanka. The hospitals are connected through a web-based Electronic Medical Record (EMR) system along with a video-conferencing component through which a patient from his/her village peripheral hospital can consult a Specialist in the city/urban area to receive treatment with the assistance of a doctor in an eClinic. After the successful implementation of this concept, a research is being carried out by the authors focusing on eClinics integration and role based access level security implementation to the Clinical Information Systems. The pilot project involves one-to-one connection. However, when going for a wider network in order to replicate the solution throughout the island, several integration techniques must be considered. This includes patient-to-eClinic, patient-to-consultant and hospital-to-eClinic connections. Also in the wider network with many eclinics integrated, access rights must be enforced to users using role based access level security model. This paper describes the architecture, methodology, features and security model of the eClinics Integration module in Clinical Information Systems.
Uploads
Papers by Dinusha Vatsalan