Academic literature on the topic 'Online social network security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online social network security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Online social network security measures"
Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (2019): 89. http://dx.doi.org/10.3390/fi11040089.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textFeng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textHe, Jianmin, Dongming Tian, and Yezheng Liu. "The Measure Method of Complaint Theme Influence in View of Netizens’ Emotional Resonance." Journal of Systems Science and Information 5, no. 4 (2017): 310–27. http://dx.doi.org/10.21078/jssi-2017-310-18.
Full textShields, Thomas, Hannah Li, Peter Lebedev, and Josiah Dykstra. "Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content In Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 441–45. http://dx.doi.org/10.1177/1071181320641099.
Full textZhou, Fan, Kunpeng Zhang, Shuying Xie, and Xucheng Luo. "Learning to Correlate Accounts Across Online Social Networks: An Embedding-Based Approach." INFORMS Journal on Computing 32, no. 3 (2020): 714–29. http://dx.doi.org/10.1287/ijoc.2019.0911.
Full textAdogame, Afe. "The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse." Asian Journal of Social Science 37, no. 4 (2009): 551–73. http://dx.doi.org/10.1163/156853109x460192.
Full textPoncy, George, Mijin Kim, Katherine Ramos, and Frederick G. Lopez. "Career Planning Confidence Among Facebook Users." Journal of Career Assessment 26, no. 4 (2017): 599–615. http://dx.doi.org/10.1177/1069072717723094.
Full textDissertations / Theses on the topic "Online social network security measures"
Yeratziotis, Alexandros. "A framework to evaluate usable security in online social networking." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012933.
Full textIrani, Danesh. "Preventing abuse of online communities." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44895.
Full textFrauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.
Full textParris, Iain. "Practical privacy and security for opportunistic networks." Thesis, University of St Andrews, 2014. http://hdl.handle.net/10023/5357.
Full textWebb, Steve. "Automatic identification and removal of low quality online information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26669.
Full textGwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.
Full textIrwin, Michael Padric. "An investigation of online threat awareness and behaviour patterns amongst secondary school learners." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002965.
Full textIkhalia, Ehinome. "A malware threat avoidance model for online social network users." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16039.
Full textRahman, Mahmudur. "Data Verifications for Online Social Networks." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2299.
Full textDua, Akshay. "Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications." PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1425.
Full textBooks on the topic "Online social network security measures"
Caviglione, Luca, Mauro Coccoli, and Alessio Merlo. Social network engineering for secure web data and services. Information Science Reference, 2013.
Find full textPerez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Syngress, 2010.
Find full textSecuring the borderless network: Security for the web 2.0 world. Cisco Press, 2010.
Find full textPrivacy online: Perspectives on privacy and self-disclosure in the social web. Springer-Verlag, 2011.
Find full textAbraham, Ajith. Computational Social Networks: Security and Privacy. Springer London, 2012.
Find full textauthor, Kessinger Bob, Sancin John G. author, and Rose Barb author, eds. Surfing among the cyber sharks: Parent's guide to protecting children and teens from online risk. Prioratus Press, 2009.
Find full textBook chapters on the topic "Online social network security measures"
Erdin, Esra, Eric Klukovich, Gurhan Gunduz, and Mehmet Hadi Gunes. "POSN: A Personal Online Social Network." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8_4.
Full textPérez-Solà, Cristina, and Jordi Herrera-Joancomartí. "Classifying Online Social Network Users through the Social Graph." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37119-6_8.
Full textCutillo, Leucio Antonio, Mark Manulis, and Thorsten Strufe. "Security and Privacy in Online Social Networks." In Handbook of Social Network Technologies and Applications. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7142-5_23.
Full textLi, Yan, Yingjiu Li, Qiang Yan, and Robert H. Deng. "Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks." In Network and System Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38631-2_55.
Full textBennett, Phillipa, Indrakshi Ray, and Robert France. "Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_6.
Full textWaheed, Amtul, Jana Shafi, and P. Venkata Krishna. "Classifying Content Quality and Interaction Quality on Online Social Networks." In Social Network Forensics, Cyber Security, and Machine Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1456-8_1.
Full textKizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Texts in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_15.
Full textKizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Texts in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_13.
Full textKizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Undergraduate Topics in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_11.
Full textKizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Ethics in Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_11.
Full textConference papers on the topic "Online social network security measures"
Krajíčková, Aneta. "Změny v managementu kulturního dědictví v důsledku pandemie Covid19." In XXIV. mezinárodního kolokvia o regionálních vědách. Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.p210-9896-2021-38.
Full textBachpalle, Shital D., and Manisha Desai. "Data security approach for online social network." In 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2014. http://dx.doi.org/10.1109/icctet.2014.6966299.
Full text"Research on Security of Online Social Network." In 2017 the 7th International Workshop on Computer Science and Engineering. WCSE, 2017. http://dx.doi.org/10.18178/wcse.2017.06.112.
Full textBarbian, Guido. "Detecting Hidden Friendship in Online Social Network." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.14.
Full textJingchi, Jiang, Yi Chengqi, Bao Yuanyuan, and Xue Yibo. "Online Community Perceiving Method on Social Network." In 1st International Workshop on Cloud Computing and Information Security. Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.99.
Full textSymeonidis, Iraklis, Pagona Tsormpatzoudi, and Bart Preneel. "Collateral Damage of Online Social Network Applications." In 2nd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2016. http://dx.doi.org/10.5220/0005806705360541.
Full textTeo, Hon Jie, Aditya Johri, and Vinod Lohani. "Assessment of online participation through social network measures: A HLM approach." In 2013 IEEE Frontiers in Education Conference (FIE). IEEE, 2013. http://dx.doi.org/10.1109/fie.2013.6685080.
Full textNing, Jianxia, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, and Prasant Mohapatra. "Secret message sharing using online social media." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997500.
Full textBeato, Filipe, Mauro Conti, Bart Preneel, and Dario Vettore. "VirtualFriendship: Hiding interactions on Online Social Networks." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997501.
Full textArnaboldi, Valerio, Marco Conti, Andrea Passarella, and Fabio Pezzoni. "Analysis of Ego Network Structure in Online Social Networks." In 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT). IEEE, 2012. http://dx.doi.org/10.1109/socialcom-passat.2012.41.
Full textReports on the topic "Online social network security measures"
Balza, Lenin H., Camilo De Los Rios, Alfredo Guerra, Luis Herrera-Prada, and Osmel Manzano. Unraveling the Network of the Extractive Industries. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003191.
Full text