Journal articles on the topic 'Online social network security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Online social network security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (2019): 89. http://dx.doi.org/10.3390/fi11040089.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.
Full textFeng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.
Full textHe, Jianmin, Dongming Tian, and Yezheng Liu. "The Measure Method of Complaint Theme Influence in View of Netizens’ Emotional Resonance." Journal of Systems Science and Information 5, no. 4 (2017): 310–27. http://dx.doi.org/10.21078/jssi-2017-310-18.
Full textShields, Thomas, Hannah Li, Peter Lebedev, and Josiah Dykstra. "Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content In Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 441–45. http://dx.doi.org/10.1177/1071181320641099.
Full textZhou, Fan, Kunpeng Zhang, Shuying Xie, and Xucheng Luo. "Learning to Correlate Accounts Across Online Social Networks: An Embedding-Based Approach." INFORMS Journal on Computing 32, no. 3 (2020): 714–29. http://dx.doi.org/10.1287/ijoc.2019.0911.
Full textAdogame, Afe. "The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse." Asian Journal of Social Science 37, no. 4 (2009): 551–73. http://dx.doi.org/10.1163/156853109x460192.
Full textPoncy, George, Mijin Kim, Katherine Ramos, and Frederick G. Lopez. "Career Planning Confidence Among Facebook Users." Journal of Career Assessment 26, no. 4 (2017): 599–615. http://dx.doi.org/10.1177/1069072717723094.
Full textȘestacov, Andrei. "Cyber Security Deficiencies in the Education Environment." Homo et Societas 5 (2020): 141–49. http://dx.doi.org/10.4467/25436104hs.20.010.13243.
Full textCh'ng, Eugene. "The bottom-up formation and maintenance of a Twitter community." Industrial Management & Data Systems 115, no. 4 (2015): 612–24. http://dx.doi.org/10.1108/imds-11-2014-0332.
Full textGadek, Guillaume, Alexandre Pauchet, Nicolas Malandain, et al. "Topological and topical characterisation of Twitter user communities." Data Technologies and Applications 52, no. 4 (2018): 482–501. http://dx.doi.org/10.1108/dta-01-2018-0006.
Full textSharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (2021): 1–24. http://dx.doi.org/10.1145/3434777.
Full textShulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.
Full textMartynova, Marina D. "“Digital trust” vs “Distrust” in the Formation of Social Relations and Practices of Glocal Society." Humanitarian: actual problems of the humanities and education 20, no. 4 (2020): 445–53. http://dx.doi.org/10.15507/2078-9823.052.020.202004.445-453.
Full textMolok, Nurul Nuha Abdul, Atif Ahmad, and Shanton Chang. "Online Social Networking." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 1–13. http://dx.doi.org/10.4018/ijcwt.2012010101.
Full textChen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.
Full textZhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.
Full textChueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.
Full textBibi, Fizza, Hikmat Khan, Tassawar Iqbal, Muhammad Farooq, Irfan Mehmood, and Yunyoung Nam. "Ranking Authors in an Academic Network Using Social Network Measures." Applied Sciences 8, no. 10 (2018): 1824. http://dx.doi.org/10.3390/app8101824.
Full textZhia Sheng, Dalian Wu, Isredza Rahmi A. Hamid, and Hannani Aman. "Multilevel Authentication for Social Network." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 220. http://dx.doi.org/10.30630/joiv.2.3-2.146.
Full textŠimandl, Václav. "ICT Teachers, Social Network Sites and Online Privacy." International Journal of Information and Communication Technologies in Education 4, no. 4 (2015): 69–81. http://dx.doi.org/10.1515/ijicte-2015-0020.
Full textWanda, Putra, Marselina Endah Hiswati, and Huang J. Jie. "DeepOSN: Bringing deep learning as malicious detection scheme in online social network." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 1 (2020): 146. http://dx.doi.org/10.11591/ijai.v9.i1.pp146-154.
Full textUmapathy, Kumaran, and Neelu Khare. "An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 807. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp807-816.
Full textZhang, Ying Gui, Ding You Lei, and Qiong Fang Zeng. "Network Security Management for Railway Out-of-Gauge and Enhanced-Load Goods Dispatching System." Advanced Materials Research 671-674 (March 2013): 3174–78. http://dx.doi.org/10.4028/www.scientific.net/amr.671-674.3174.
Full textGrubicka, Joanna. "Freedom of Network Society in a Social Security Space." Security Dimensions 34, no. 34 (2020): 234–55. http://dx.doi.org/10.5604/01.3001.0014.5613.
Full textGafni, Ruti, Tal Pavel, Raz Margolin, and Ben Weiss. "Strong password? Not with your social network data!" Online Journal of Applied Knowledge Management 5, no. 1 (2017): 27–41. http://dx.doi.org/10.36965/ojakm.2017.5(1)27-41.
Full textElmendili, Fatna, Nisrine Maqran, Younes El Bouzekri El Idrissi, and Habiba Chaoui. "A security approach based on honeypots: Protecting Online Social network from malicious profiles." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 198–204. http://dx.doi.org/10.25046/aj020326.
Full textFreitas, Bruna, Ashraf Matrawy, and Robert Biddle. "Online Neighborhood Watch: The Impact of Social Network Advice on Software Security Decisions." Canadian Journal of Electrical and Computer Engineering 39, no. 4 (2016): 322–32. http://dx.doi.org/10.1109/cjece.2016.2613961.
Full textBuzaglo, Joanne S., Clare Karten, Elisa Weiss, Melissa F. Miller, and Anne Morris. "The Financial Costs of Chronic Myeloid Leukemia and Implications for Quality of Life and Adherence: Findings from the Cancer Experience Registry." Blood 124, no. 21 (2014): 2602. http://dx.doi.org/10.1182/blood.v124.21.2602.2602.
Full textDadkhah, Mehdi, Tole Sutikno, and Shahaboddin Shamshirband. "Social Network Applications and Free Online Mobile Numbers: Real Risk." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 2 (2015): 175. http://dx.doi.org/10.11591/ijece.v5i2.pp175-176.
Full textAhn, Jong-chang, Suaini Sura, and Jong-Chol An. "Intention to donate via social network sites (SNSs)." Information Technology & People 31, no. 4 (2018): 910–26. http://dx.doi.org/10.1108/itp-12-2015-0307.
Full textDong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.
Full textThormann, Joan, Samuel Gable, Patricia Seferlis Fidalgo, and George Blakeslee. "Interaction, critical thinking, and social network analysis (SNA) in online courses." International Review of Research in Open and Distributed Learning 14, no. 3 (2013): 294. http://dx.doi.org/10.19173/irrodl.v14i3.1306.
Full textJayabalan, K., and B. Subramani. "A Survey on Online Social Networks: Applications, Threats and Solutions." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 6–8. http://dx.doi.org/10.51983/ajcst-2019.8.2.2149.
Full textProchnow, Tyler, Megan S. Patterson, Logan Hartnell, and M. Renée Umstattd Meyer. "Depressive symptoms associations with online and in person networks in an online gaming community: a pilot study." Mental Health Review Journal 25, no. 1 (2020): 21–33. http://dx.doi.org/10.1108/mhrj-11-2019-0044.
Full textKamoru, Balogun Abiodun, Azmi Bin Jaafar, Masrah Azrifah Azmi Murad, and Marzanah A. Jabar. "Understanding Security Threats in Spam Detection on Social Networks." Circulation in Computer Science 2, no. 5 (2017): 18–22. http://dx.doi.org/10.22632/ccs-2017-252-19.
Full textGnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.
Full textBlack, Erik W., Lindsay A. Thompson, W. Patrick Duff, Kara Dawson, Heidi Saliba, and Nicole M. Paradise Black. "Revisiting Social Network Utilization by Physicians-in-Training." Journal of Graduate Medical Education 2, no. 2 (2010): 289–93. http://dx.doi.org/10.4300/jgme-d-10-00011.1.
Full textShetty, Nisha P., Balachandra Muniyal, and Saleh Mowla. "Policy resolution of shared data in online social networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 3767. http://dx.doi.org/10.11591/ijece.v10i4.pp3767-3776.
Full textSun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.
Full textHo, Thanh, and Phuc Do. "A New Model for Discovering Communities of Users on Social Network." Science and Technology Development Journal 19, no. 1 (2016): 81–94. http://dx.doi.org/10.32508/stdj.v19i1.613.
Full textAgah, Afrand, and Mehran Asadi. "Influence and Information Flow in Online Social Networks." International Journal of Virtual Communities and Social Networking 9, no. 4 (2017): 1–17. http://dx.doi.org/10.4018/ijvcsn.2017100101.
Full textRababah, Osama, and Bassam Alqudah. "Building a Trust Model for Social Network." Modern Applied Science 12, no. 4 (2018): 69. http://dx.doi.org/10.5539/mas.v12n4p69.
Full textGallova, Viktoria, Marek Palasinski, Neil Shortland, Michael Humann, and Lorraine Bowman Grieve. "Anxiety about digital security and terrorism, and support for counter-terror measures." Safer Communities 17, no. 3 (2018): 156–66. http://dx.doi.org/10.1108/sc-02-2018-0007.
Full textMaireder, Axel, Brian E. Weeks, Homero Gil de Zúñiga, and Stephan Schlögl. "Big Data and Political Social Networks." Social Science Computer Review 35, no. 1 (2016): 126–41. http://dx.doi.org/10.1177/0894439315617262.
Full textR, Balamurugan, Dhivakar M, Muruganantham G, and Ramprakash S. "Securing Heterogeneous Privacy Protection in Social Network Records based Encryption Scheme." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (2019): 10–13. http://dx.doi.org/10.17762/ijritcc.v7i3.5249.
Full textBatool, Zahra, Muhammad Junaid, Muhammad Naeem, et al. "Identifying Disease Comorbidity Patterns Using Centrality Measures in Computing." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 2964–75. http://dx.doi.org/10.47059/revistageintec.v11i4.2332.
Full textZhang, Lanfang, Zhiyong Zhang, and Ting Zhao. "A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual Verification." International Journal of Cloud Applications and Computing 11, no. 2 (2021): 17–31. http://dx.doi.org/10.4018/ijcac.2021040102.
Full text