To see the other types of publications on this topic, follow the link: Online social network security measures.

Journal articles on the topic 'Online social network security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Online social network security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (2019): 89. http://dx.doi.org/10.3390/fi11040089.

Full text
Abstract:
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
APA, Harvard, Vancouver, ISO, and other styles
2

Ikhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Full text
Abstract:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself. Findings Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs. Research limitations/implications The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions. Practical implications SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos. Social implications The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness. Originality/value Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.

Full text
Abstract:
Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.
APA, Harvard, Vancouver, ISO, and other styles
5

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
6

He, Jianmin, Dongming Tian, and Yezheng Liu. "The Measure Method of Complaint Theme Influence in View of Netizens’ Emotional Resonance." Journal of Systems Science and Information 5, no. 4 (2017): 310–27. http://dx.doi.org/10.21078/jssi-2017-310-18.

Full text
Abstract:
AbstractOn the social network platform, complaints about the public policy formulation and implementation issues arise largely. Through the information aggregation, frequent interaction, word-of-mouth and emotional resonance on online social network, these information will lead to the outbreak of the network complaints. It brings difficulties and challenges in public management. China is under a period of social transformation, and there are various problems and contradictions. Emergency can easily arouse group complaints on online network, and it will lead to network public opinion through inducing social emotional resonance, which is harmful to social security and stability. This paper has built the evaluation index system from four dimensions with complaint text’s quality, transmission timeliness, user interaction degree and emotional resonance excited by emergency. Then, we establish the dynamic influence measure model of online netizens complaint theme based on an entropy weight model. The measure model is proved to be reasonable and effective by the empirical research of Sina Weibo data. The model can effectively solve the measure problem of group complaints influence when the emergencies arouse social emotional resonance. It has important theoretical significance and practical value for public policy decision-maker on listening to online group complaints, understanding public opinion, and making public policy.
APA, Harvard, Vancouver, ISO, and other styles
7

Shields, Thomas, Hannah Li, Peter Lebedev, and Josiah Dykstra. "Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content In Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 441–45. http://dx.doi.org/10.1177/1071181320641099.

Full text
Abstract:
The Internet is a rich environment for information to spread rapidly and widely. The ability of cybersecurity content to achieve virality in social networks can be useful for measuring security awareness, policy adoption, or cybersecurity literacy. It may also reveal new and emerging cybersecurity events. Virality in online social networks can be characterized and measured many ways and have different causes. Leveraging existing research in social network virality measurements, we calculate and analyze virality measurements and correlations on an anonymized Reddit dataset, examining overall trends and characteristics of individual cybersecurity forums (subreddits). We reproduce content-based virality prediction algorithms and assess their performance, then introduce additional features beyond post title, including time of day, to improve prediction accuracy to ~71% for each of the virality scores. We examine the intersection of the virality facets to reveal correlations about the content and times when cybersecurity content is most viral.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Fan, Kunpeng Zhang, Shuying Xie, and Xucheng Luo. "Learning to Correlate Accounts Across Online Social Networks: An Embedding-Based Approach." INFORMS Journal on Computing 32, no. 3 (2020): 714–29. http://dx.doi.org/10.1287/ijoc.2019.0911.

Full text
Abstract:
Cross-site account correlation correlates users who have multiple accounts but the same identity across online social networks (OSNs). Being able to identify cross-site users is important for a variety of applications in social networks, security, and electronic commerce, such as social link prediction and cross-domain recommendation. Because of either heterogeneous characteristics of platforms or some unobserved but intrinsic individual factors, the same individuals are likely to behave differently across OSNs, which accordingly causes many challenges for correlating accounts. Traditionally, account correlation is measured by analyzing user-generated content, such as writing style, rules of naming user accounts, or some existing metadata (e.g., account profile, account historical activities). Accounts can be correlated by de-anonymizing user behaviors, which is sometimes infeasible since such data are not often available. In this work, we propose a method, called ACCount eMbedding (ACCM), to go beyond text data and leverage semantics of network structures, a possibility that has not been well explored so far. ACCM aims to correlate accounts with high accuracy by exploiting the semantic information among accounts through random walks. It models and understands latent representations of accounts using an embedding framework similar to sequences of words in natural language models. It also learns a transformation matrix to project node representations into a common dimensional space for comparison. With evaluations on both real-world and synthetic data sets, we empirically demonstrate that ACCM provides performance improvement compared with several state-of-the-art baselines in correlating user accounts between OSNs.
APA, Harvard, Vancouver, ISO, and other styles
9

Adogame, Afe. "The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse." Asian Journal of Social Science 37, no. 4 (2009): 551–73. http://dx.doi.org/10.1163/156853109x460192.

Full text
Abstract:
AbstractOne issue that has launched Nigeria into international réclame and public ignominy, especially in the last decade, is the Advance Fee Fraud (a.k.a. '419'), a code which refers originally to the section of the Nigerian Penal Law that deals with specific fraud schemes. The paper located the economic and socio-political upheavals in Nigeria from the late 1970s as the leverage for the advent and consolidation of fraudulent schemes. It demonstrated how youths have increasingly appropriated the Internet as a gateway to the world and as conduits for information enhancement, economic empowerment or a means to achieving their own ends. Through a careful analysis of 150 documented scam letters, this paper describes the emerging variations of a theme. As a transnational organised crime, this paper demonstrates how its increasing complexity and sophistication, with the target audience of individuals and corporate bodies within the domestic and international frontiers, has attracted local-global security attention and action. The paper concludes that the changing anatomy and the elasticity of the criminal transnational networks can be better grasped, and the preventive measures by individual, government and corporate security agencies prove efficacious, when understood and located within local-global contexts and wider operational frameworks.
APA, Harvard, Vancouver, ISO, and other styles
10

Poncy, George, Mijin Kim, Katherine Ramos, and Frederick G. Lopez. "Career Planning Confidence Among Facebook Users." Journal of Career Assessment 26, no. 4 (2017): 599–615. http://dx.doi.org/10.1177/1069072717723094.

Full text
Abstract:
As a highly popular social networking site (SNS) for exchanging information about their personal activities, values, goals, and accomplishments with their online “friends,” Facebook (FB)© enables social comparisons and identity negotiations that may influence college students’ career planning confidence. However, to date, no studies have examined whether FB use activities and “friend” networks are uniquely associated with such confidence when dispositional variables associated with students’ needs for belongingness and self-presentation are concurrently controlled. In the present study, participants provided information about their FB use activities and networks and completed self-report measures of adult attachment security, authenticity, career decision self-efficacy, and career aspirations. We hypothesized that, controlling for features of FB use, adult attachment security and authenticity would make significant and incremental contributions to our indicators of career confidence and that authenticity would mediate expected relations between attachment security and these outcomes. Our findings yielded general support for these hypotheses. Implications for career counseling practice that considers both clients’ relational dispositions and uses of social media are discussed.
APA, Harvard, Vancouver, ISO, and other styles
11

Șestacov, Andrei. "Cyber Security Deficiencies in the Education Environment." Homo et Societas 5 (2020): 141–49. http://dx.doi.org/10.4467/25436104hs.20.010.13243.

Full text
Abstract:
Information technologies have already radically transformed the communications and information technology sectors, trade, media, and the education sector, especially education, which is on the top priority. Digital technologies will radically change the way data is sent and retrieved, will allow immediate and real-time feedback from students, will facilitate access to education through distance learning, will allow new service providers to enter traditional markets education. Thus, a diligent and well planned implementation of cyber security, as well as information security of information networks of educational institutions will provide a definite competitive advantage in the information environment. In the context of a dynamic information environment prone to large-scale cyber-attacks, in which cybercriminals are using increasingly advanced methods to implement attack vectors that are undetectable and difficult to neutralize, this scientific study is designed to protect data and security of your institutions as well as to ensure the confidentiality of your students and teachers. Whether we are talking about large or small educational institutions, this study provides a series of recommendations on the secure use of social networks with a minimum set of measures needed to prevent cyber-attacks as well as reduce the damage caused in case of attacks. At the same time, it will examine the best practices in the online environment, effectively analyze the privacy settings of mobile devices and present some top tips for the secure use of social networks. The study aims to comply with the following minimum set of measures in order to prevent cyber-attacks in educational institutions, and reduce the damage caused in the event of attacks. Cyber-bezpieczeństwo w obszarze edukacji Technologie informacyjne radykalnie przekształciły sektory komunikacji, handlu, mediów i edukacji. Technologie cyfrowe zmienią sposób przesyłania i wyszukiwania danych, umożliwią natychmiastową informację zwrotną od uczniów w czasie rzeczywistym oraz ułatwiają dostęp do edukacji poprzez kształcenie na odległość. Zatem rzetelne i dobrze zaplanowane wdrożenie cyberbezpieczeństwa, a także bezpieczeństwa informacyjnego sieci informacyjnych placówek oświatowych zapewni zdecydowaną przewagę konkurencyjną w środowisku informacyjnym. Artykuł ma na celu przedstawienie środków zapobiegawczych przeciw cyberatakom w placówkach edukacyjnych i ograniczania szkód wyrządzanych w przypadku takich ataków.
APA, Harvard, Vancouver, ISO, and other styles
12

Ch'ng, Eugene. "The bottom-up formation and maintenance of a Twitter community." Industrial Management & Data Systems 115, no. 4 (2015): 612–24. http://dx.doi.org/10.1108/imds-11-2014-0332.

Full text
Abstract:
Purpose – The purpose of this paper is to explore the formation, maintenance and disintegration of a fringe Twitter community in order to understand if offline community structure applies to online communities. Design/methodology/approach – The research adopted Big Data methodological approaches in tracking user-generated contents over a series of months and mapped online Twitter interactions as a multimodal, longitudinal “social information landscape”. Centrality measures were employed to gauge the importance of particular user nodes within the complete network and time-series analysis were used to track ego centralities in order to see if this particular online communities were maintained by specific egos. Findings – The case study shows that communities with distinct boundaries and memberships can form and exist within Twitter’s limited user content and sequential policies, which unlike other social media services, do not support formal groups, demonstrating the resilience of desperate online users when their ideology overcome social media limitations. Analysis in this paper using social networks approaches also reveals that communities are formed and maintained from the bottom-up. Research limitations/implications – The research data is based on a particular data set which occurred within a specific time and space. However, due to the rapid, polarising group behaviour, growth, disintegration and decline of the online community, the data set presents a “laboratory” case from which many other online community can be compared with. It is highly possible that the case can be generalised to a broader range of communities and from which online community theories can be proved/disproved. Practical implications – The paper showed that particular group of egos with high activities, if removed, could entirely break the cohesiveness of the community. Conversely, strengthening such egos will reinforce the community strength. The questions mooted within the paper and the methodology outlined can potentially be applied in a variety of social science research areas. The contribution to the understanding of a complex social and political arena, as outlined in the paper, is a key example of such an application within an increasingly strategic research area – and this will surely be applied and developed further by the computer science and security community. Originality/value – The majority of researches that cover these domains have not focused on communities that are multimodal and longitudinal. This is mainly due to the challenges associated with the collection and analysis of continuous data sets that have high volume and velocity. Such data sets are therefore unexploited with regards to cyber-community research.
APA, Harvard, Vancouver, ISO, and other styles
13

Gadek, Guillaume, Alexandre Pauchet, Nicolas Malandain, et al. "Topological and topical characterisation of Twitter user communities." Data Technologies and Applications 52, no. 4 (2018): 482–501. http://dx.doi.org/10.1108/dta-01-2018-0006.

Full text
Abstract:
Purpose Most of the existing literature on online social networks (OSNs) either focuses on community detection in graphs without considering the topic of the messages exchanged, or concentrates exclusively on the messages without taking into account the social links. The purpose of this paper is to characterise the semantic cohesion of such groups through the introduction of new measures. Design/methodology/approach A theoretical model for social links and salient topics on Twitter is proposed. Also, measures to evaluate the topical cohesiveness of a group are introduced. Inspired from precision and recall, the proposed measures, called expertise and representativeness, assess how a set of groups match the topic distribution. An adapted measure is also introduced when a topic similarity can be computed. Finally, a topic relevance measure is defined, similar to tf.idf (term-frequency, inverse document frequency). Findings The measures yield interesting results, notably on a large tweet corpus: the metrics accurately describe the topics discussed in the tweets and enable to identify topic-focused groups. Combined with topological measures, they provide a global and concise view of the detected groups. Originality/value Many algorithms, applied on OSN, detect communities which often lack of meaning and internal semantic cohesion. This paper is among the first to quantify this aspect, and more precisely the topical cohesion and topical relevance of a group. Moreover, the proposed indicators can be exploited for social media monitoring, to investigate the impact of a group of people: for instance, they could be used for journalism, marketing and security purposes.
APA, Harvard, Vancouver, ISO, and other styles
14

Sharma, Tanusree, Hunter A. Dyer, and Masooda Bashir. "Enabling User-centered Privacy Controls for Mobile Applications." ACM Transactions on Internet Technology 21, no. 1 (2021): 1–24. http://dx.doi.org/10.1145/3434777.

Full text
Abstract:
Mobile apps have transformed many aspects of clinical practice and are becoming a commonplace in healthcare settings. The recent COVID-19 pandemic has provided the opportunity for such apps to play an important role in reducing the spread of the virus. Several types of COVID-19 apps have enabled healthcare professionals and governments to communicate with the public regarding the pandemic spread, coronavirus awareness, and self-quarantine measures. While these apps provide immense benefits for the containment of the spread, privacy and security of these digital tracing apps are at the center of public debate. To address this gap, we conducted an online survey of a midwestern region in the United State to assess people’s attitudes toward such apps and to examine their privacy and security concerns and preferences. Survey results from 1,550 participants indicate that privacy/security protections and trust play a vital role in people’s adoption of such apps. Furthermore, results reflect users’ preferences wanting to have control over their personal information and transparency on how their data is handled. In addition, personal data protection priorities selected by the participants were surprising and yet revealing of the disconnect between technologists and users. In this article, we present our detailed survey results as well as design guidelines for app developers to develop innovative human-centered technologies that are not only functional but also respectful of social norms and protections of civil liberties. Our study examines users’ preferences for COVID-19 apps and integrates important factors of trust, willingness, and preferences in the context of app development. Through our research findings, we suggest mechanisms for designing inclusive apps’ privacy and security measures that can be put into practice for healthcare-related apps, so that timely adoption is made possible.
APA, Harvard, Vancouver, ISO, and other styles
15

Shulga, Olga. "Confidentiality and scam in the internet." University Economic Bulletin, no. 48 (March 30, 2021): 76–91. http://dx.doi.org/10.31470/2306-546x-2021-48-76-91.

Full text
Abstract:
The purpose of the work is to consider the theoretical and practical aspects of fraud in the Internet sphere and on this basis to identify ways to ensure the confidentiality and cybersecurity of private users and commercial organizations. The methodological basis of the work is the use of general and special methods of scientific knowledge. Methods of combining analysis and synthesis, induction and deduction have been used to identify different types of fraud in the Internet. Generalization methods, logical and empirical, were used in determining the directions of development of the national cyber defense system and ensuring confidentiality. The main results of the work: The most common methods of fraud with the use of bank payment cards are identified, among which: a fake poll on social networks with a prize draw; a phone call to obtain classified information; SIM card replacement for access to online banking; online payments on unsecured sites; phishing; copying card data when handed over; unsecured WI-Fi networks; computers in public places; skimming for card data theft; unauthorized micropayments; ATM fraud; use of malicious programs (viruses), fake sites in order to compromise the details of electronic payment instruments and/or logins/passwords for access to Internet/mobile banking systems; dissemination (sale, dissemination) of information on compromised data; terminal network fraud; fraud in remote service systems; social engineering. Basic security rules are defined to prevent fraud. The experience of European countries in the field of cybersecurity is analyzed. The directions of adaptation of the current legislation on cybersecurity to the EU standards are outlined and the directions of development of the national system of cybersecurity are defined. The practical significance of the results is to deepen the understanding of the nature and mechanism of various types of fraud in the Internet. The recommendations proposed in the paper can form a methodological and theoretical basis for the development of economic policy of the state to ensure the confidentiality and cybersecurity of private users and commercial organizations. Conclusions. The state should establish an effective oversight body in the field of personal data protection, but security measures and online restrictions should comply with international standards. The use of encryption should not be prohibited at the legislative level, as such restrictions reduce the ability of citizens to protect themselves from illegal intrusions into privacy. In addition, the state policy in the Internet should be aimed at promoting the development and operation of secure Internet technologies and the formation of mechanisms to protect against services and protocols that threaten the technical functioning of the Internet from viruses, phishing and more.
APA, Harvard, Vancouver, ISO, and other styles
16

Martynova, Marina D. "“Digital trust” vs “Distrust” in the Formation of Social Relations and Practices of Glocal Society." Humanitarian: actual problems of the humanities and education 20, no. 4 (2020): 445–53. http://dx.doi.org/10.15507/2078-9823.052.020.202004.445-453.

Full text
Abstract:
Introduction. The individual’s application of established social practices in the digital environment faces certain difficulties caused by the wide opportunities for “honest” and “dishonest” behavior on the Internet. The high level of trust in digital technologies and the possibility of manipulating personal data, the desire to rely on “expert opinion” and unreliable information, the social need for communication and the illusion of communication in social networks, as well as other dilemmas of relationships in the digital world and operating with big data create a sense of uncertainty, instability and disunity in the perception of digital reality. The purpose of the article is to identify social and ethical aspects of trust phenomenon as an attitude of consciousness, obstacles to digital trust and identify ways to develop it. Materials and Methods. The interdisciplinary approach based on ethics of information technology, sociology, and communication theory allows us to analyze the formation of new social practices and interpret the development of a person’s value attitude to new realities of life. Research result. The following areas of actualization of the concept of “trust” in the digital world are identified as trust in data and algorithms, trust in “digital subject”, “Internet of trust” as a space of obligations and rules. The formation of the “Internet of trust” is associated with awareness of all social, moral and psychological problems associated with the process of combining online and offline environments in the social practice of an individual, where new forms of applying traditional standards of behavior should be found. Discussion and Conclusion. Postponing the rational risk analysis of digital interaction by an individual “for later” provokes the creation of situations that are critical for the individual’s well-being and security. The costs of digital trust are reduced security and creation of “traps” in public relations and social practices. Digital environment creates a situation of vulnerability of an individual, which encourages him to resort to possible measures of protection. In turn, the “Internet of trust” as a new digital reality is absolutely necessary for the effective functioning and further development of society.
APA, Harvard, Vancouver, ISO, and other styles
17

Molok, Nurul Nuha Abdul, Atif Ahmad, and Shanton Chang. "Online Social Networking." International Journal of Cyber Warfare and Terrorism 2, no. 1 (2012): 1–13. http://dx.doi.org/10.4018/ijcwt.2012010101.

Full text
Abstract:
The professionalization of computer crime has resulted in a shift in motivation away from bragging rights towards financial gain. As a result, the operational tactics of cyber criminals is beginning to incorporate reconnaissance and intelligence gathering to inform attack planning. This paper discusses why information leakage in general, and Online Social Networking (OSN) in particular, has become a source of intelligence for attackers. Further, the paper profiles a range of security measures available to organizations to combat information leakage through OSN and identifies future directions for research into security culture and behaviour change.
APA, Harvard, Vancouver, ISO, and other styles
18

Chen, Jing. "Analysis on Network Security and Corresponding Preventive Measures." Applied Mechanics and Materials 241-244 (December 2012): 2312–15. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.2312.

Full text
Abstract:
Network security is one of the most important issues in the face of Internet development. Major researches are done on improving the current status of the security of internet. This article describes some major factors threatening internet, and analysis the latest security techniques. corresponding strategies are proposed to achieve a safe, worry-free environment online.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Wen Jie. "Network Security Vulnerabilities and Preventive Measures." Applied Mechanics and Materials 433-435 (October 2013): 1674–78. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1674.

Full text
Abstract:
As the arrival times network economy and social networks, computers and computer networks popularity indicates that a ubiquitous network will go into not the state. As the use of network and the virus has become increasingly serious, virus writers from the original to show off to obtain invalid income, the resulting harm is incalculable. This situation not only jeopardize the current development of the Internet but also undermined the reality of social stability and unity, therefore, this paper is on how the network vulnerabilities, how to survive and how to protection, so that there are loopholes in our network deeper understanding of network vulnerability and protection so that we have a new breakthrough for the network to provide a good environment for development.
APA, Harvard, Vancouver, ISO, and other styles
20

Chueh, Hao-En, Shun-Chuan Ho, Shih-Peng Chang, and Ping-Yu Hsu. "Online Intrusion Behaviors: Sequences and Time Intervals." Social Behavior and Personality: an international journal 38, no. 10 (2010): 1307–12. http://dx.doi.org/10.2224/sbp.2010.38.10.1307.

Full text
Abstract:
In this study we model the sequences and time intervals of online intrusion behaviors. To maintain network security, intrusion detection systems monitor network environments; however, most existing intrusion detection systems produce too many intrusion alerts, causing network managers to investigate many potential intrusions individually to determine their validity. To solve this problem, we combined a clustering analysis of the time intervals of online users' behaviors with a sequential pattern analysis to identify genuine intrusion behaviors. Knowledge of the patterns generated by intruder behaviors can help network managers maintain network security.
APA, Harvard, Vancouver, ISO, and other styles
21

Bibi, Fizza, Hikmat Khan, Tassawar Iqbal, Muhammad Farooq, Irfan Mehmood, and Yunyoung Nam. "Ranking Authors in an Academic Network Using Social Network Measures." Applied Sciences 8, no. 10 (2018): 1824. http://dx.doi.org/10.3390/app8101824.

Full text
Abstract:
Online social networks are widely used platforms that enable people to connect with each other. These social media channels provide an active communication platform for people, and they have opened new venues of research for the academic world and business. One of these research areas is measuring the influential users in online social networks; and the same is true for academic networks where finding influential authors is an area of interest. In an academic network, citation count, h-index and their variations are used to find top authors. In this article, we propose the adoption of established social network measures, including centrality and prestige, in an academic network to compute the rank of authors. For the empirical analysis, the widely-used dataset of the Digital Bibliography and Library Project (DBLP) is exploited in this research, and the micro-level properties of the network formed in the DBLP co-authorship network are studied. Afterwards, the results are computed using social network measures and evaluated using the standard ranking performance evaluation measures, including Kendall correlation, Overlapping Similarlity (OSim) and Spearman rank-order correlation. The results reveal that the centrality measures are significantly correlated with the citation count and h-index. Consequently, social network measures have potential to be used in an academic network to rank the authors.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhia Sheng, Dalian Wu, Isredza Rahmi A. Hamid, and Hannani Aman. "Multilevel Authentication for Social Network." JOIV : International Journal on Informatics Visualization 2, no. 3-2 (2018): 220. http://dx.doi.org/10.30630/joiv.2.3-2.146.

Full text
Abstract:
Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology. The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.
APA, Harvard, Vancouver, ISO, and other styles
23

Šimandl, Václav. "ICT Teachers, Social Network Sites and Online Privacy." International Journal of Information and Communication Technologies in Education 4, no. 4 (2015): 69–81. http://dx.doi.org/10.1515/ijicte-2015-0020.

Full text
Abstract:
Abstract The article looks at primary and secondary ICT teachers’ attitude to social network sites and privacy protection on the Internet. Attention is devoted to student-teacher friendships within online network sites. The study includes a description of specific habits as well as a discussion of how teachers make decisions and what influences them. The research has used in-depth semi-structured interviews, focusing on ICT teachers with differing views on the issue in question. Our investigations have been supported by triangulation, which involved accessing information about given teachers on social network sites. Data gained from interviews and triangulation has been processed using open coding. The results of our investigation show that teachers appreciate SNS because of the possibility to communicate and keep in touch with people they know, including former pupils. Teachers are concerned about the risks associated with using SNS, particularly security and privacy risks, and they feel even more under threat due to their occupation. Some teachers decided not to reject their pupils’ friend requests for educational reasons, claiming SNS serve as a channel of communication to support teaching and learning.
APA, Harvard, Vancouver, ISO, and other styles
24

Wanda, Putra, Marselina Endah Hiswati, and Huang J. Jie. "DeepOSN: Bringing deep learning as malicious detection scheme in online social network." IAES International Journal of Artificial Intelligence (IJ-AI) 9, no. 1 (2020): 146. http://dx.doi.org/10.11591/ijai.v9.i1.pp146-154.

Full text
Abstract:
Manual analysis for malicious prediction in Online Social Networks (OSN) is time-consuming and costly. With growing users within the environment, it becomes one of the main obstacles. Deep learning is growing algorithm that gains a big success in computer vision problem. Currently, many research communities have proposed deep learning techniques to automate security tasks, including anomalous detection, malicious link prediction, and intrusion detection in OSN. Notably, this article describes how deep learning makes the OSN security technique more intelligent for detecting malicious activity by establishing a classifier model.
APA, Harvard, Vancouver, ISO, and other styles
25

Umapathy, Kumaran, and Neelu Khare. "An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 2 (2018): 807. http://dx.doi.org/10.11591/ijeecs.v10.i2.pp807-816.

Full text
Abstract:
<span lang="EN-US">Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore it is not possible to prevent undesired messages. Providing the service is not only a matter of using previously defined web content mining and security techniques. To overcome the issues, Level-level Security Optimization & Content Visualization Algorithm is proposed to avoid the privacy issues during content sharing and data visualization. It adopts level by level privacy based on user requirement in the social network. It evaluates the privacy compatibility in the online social network environment to avoid security complexities. The mechanism divided into three parts namely like online social network platform creation, social network privacy, social network within organizational privacy and network controlling and authentication. Based on the experimental evaluation, a proposed method improves the privacy retrieval accuracy (PRA) 9.13% and reduces content retrieval time (CRT) 7 milliseconds and information loss (IL) 5.33%.</span>
APA, Harvard, Vancouver, ISO, and other styles
26

Zhang, Ying Gui, Ding You Lei, and Qiong Fang Zeng. "Network Security Management for Railway Out-of-Gauge and Enhanced-Load Goods Dispatching System." Advanced Materials Research 671-674 (March 2013): 3174–78. http://dx.doi.org/10.4028/www.scientific.net/amr.671-674.3174.

Full text
Abstract:
Railway out-of-gauge and enhanced-load goods (ROEG) transport organization with risky, costly and difficult characteristics is the system engineering. For better scientific online management, ROEG dispatching system (ROEGDS) with B/S mode and three-layer is developed. Then, with the network framework and architecture for ROEGDS, network security technologies including firewall intrusion detection, dynamic password authentication, security vulnerability assessment technologies and so on are all put forward. Besides, concrete security management measures are further given from four aspects to ensure network security. The results from its trial in Nanning Railway Administration show that ROEGDS can achieve given goals and these network security technologies and management measures put forward in the paper can also guarantee ROEGDS and ROEG transport safety.
APA, Harvard, Vancouver, ISO, and other styles
27

Grubicka, Joanna. "Freedom of Network Society in a Social Security Space." Security Dimensions 34, no. 34 (2020): 234–55. http://dx.doi.org/10.5604/01.3001.0014.5613.

Full text
Abstract:
The purpose of this article is to reflect on what freedom of speech in the web is. In the age of universal freedom of access to the Internet, controversy is growing between supporters of full freedom and supporters of legal restrictions on the use of global Internet resources. Should the Internet be the space of unlimited freedom? Surprisingly enough, the answer to this question is not obvious, although intuitively one would like to answer in the affirmative. By definition, the Internet is an egalitarian tool of communication, a space for free creation and flow of content, for which the only limit is technology and human imagination, whose boundaries cannot be determined. The global network is a field completely unregulated and not bound by any rules. This situation is slowly changing and legislators and courts are beginning to set the boundaries of online proceedings. People posting content on the Internet must do so with precaution so as not to violate the limits of freedom of speech, especially in the field of broadly understood public security, crime, morality, public order, other people’s personal rights, and confidential information.
APA, Harvard, Vancouver, ISO, and other styles
28

Gafni, Ruti, Tal Pavel, Raz Margolin, and Ben Weiss. "Strong password? Not with your social network data!" Online Journal of Applied Knowledge Management 5, no. 1 (2017): 27–41. http://dx.doi.org/10.36965/ojakm.2017.5(1)27-41.

Full text
Abstract:
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online fraud, therefore, there is a need to secure existing passwords, and to create ones that will be more crack-resistant. This study addresses the issue of personal data, which users enter on social networks, and incorporate in passwords, as well as how tracking and identifying this data assists hackers in cracking these passwords. The study focuses on Facebook, conducting an online anonymous questionnaire among 195 respondents, and an experiment among a voluntary response sample of 72 participants, in which passwords were tried to been deciphered by a custom dictionary attack. The findings confirm a link between the use of accessible online personal data and success rates of password deciphering. The findings underscore the grave threat to users’ information security - not only as a result of their voluntary exposure of personal data on social networks, but also due to the integration of this data into their passwords. The study argues the need to emphasize users' awareness to their password strength, with this vulnerability in mind.
APA, Harvard, Vancouver, ISO, and other styles
29

Elmendili, Fatna, Nisrine Maqran, Younes El Bouzekri El Idrissi, and Habiba Chaoui. "A security approach based on honeypots: Protecting Online Social network from malicious profiles." Advances in Science, Technology and Engineering Systems Journal 2, no. 3 (2017): 198–204. http://dx.doi.org/10.25046/aj020326.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Freitas, Bruna, Ashraf Matrawy, and Robert Biddle. "Online Neighborhood Watch: The Impact of Social Network Advice on Software Security Decisions." Canadian Journal of Electrical and Computer Engineering 39, no. 4 (2016): 322–32. http://dx.doi.org/10.1109/cjece.2016.2613961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Buzaglo, Joanne S., Clare Karten, Elisa Weiss, Melissa F. Miller, and Anne Morris. "The Financial Costs of Chronic Myeloid Leukemia and Implications for Quality of Life and Adherence: Findings from the Cancer Experience Registry." Blood 124, no. 21 (2014): 2602. http://dx.doi.org/10.1182/blood.v124.21.2602.2602.

Full text
Abstract:
Abstract Background: US prevalence of CML is estimated at 33,990 of January 1, 2011 (SEER, 2014). In 2014, about 5,980 new CML cases will be diagnosed (ACS, 2014). The era of tyrosine kinase inhibitors has transformed CML from an often fatal disease to one with an excellent prognosis, with ongoing treatment. Many people living with CML may have to manage a significant financial burden related to care, including medication copays and coinsurance, and other out of pocket costs. Several studies have reported that the financial burden of CML care is associated with decreased adherence (Dusetzina, 2014; Abraham, 2012; Noens, 2009). Poor adherence is associated with statistically significant decreases in 5-year event-free survival and may occur more frequently than either patients or physicians recognize (Oehler, 2013). Methods: From October 2013 to June 2014, the Cancer Support Community (CSC) and The Leukemia & Lymphoma Society (LLS) registered 484 people living with CML to the Cancer Experience Registry: CML, an online initiative designed to learn and raise awareness about the psychosocial impact of CML. Registrants were recruited through an outreach program that leveraged CSC’s and LLS’s networks of community-based affiliates and chapters, online communities, CSC’s helpline and LLS’s information resource center, other advocacy organizations, social and other media channels. 393 registrants (81%) responded to a survey, including questions about the financial cost of CML and cancer-related distress. Stress-related intrusive ideation about managing the financial impact of CML was measured using the Impact of Event Scale (IES, 7 items, Horowitz, 1979); levels >13 were used to indicate clinically significant symptoms associated with anxiety. Fifteen items from a validated distress screener (α=0.93) (CancerSupportSource, Miller 2014) were summed to create a score for overall distress (mean=23, SD=14, range 0-60), and 4 items were summed for a depression score (α=0.88) with a binary variable created to indicate at risk for depression (score≥5). For these analyses, we excluded survey participants living outside the US (n=54) and bone marrow transplant patients not taking oral CML medications (n=11). The sample (n=327) was 68% female, 98% Caucasian, median age 59. Median time since CML diagnosis was 4 years. Total annual income: 32% <$40K; 30% $40-79K; 37% at least $80K. Results: Nearly half (48%) reported spending at least $100 per month on all out of pocket costs related to CML; 27% spent $250 or more; 15% spent $500 or more; 5% spent $1,000 or more. Greater out of pocket costs were associated with higher overall distress (p<0.001) and increased risk of depression (p<0.001), adjusting for income. One-third (34%) reported that CML-related out of pocket costs affect their household “quite a bit” or “very much”; 21% responded “a little bit”; 27% responded “not at all.” More than one-third (37%) reported currently experiencing clinically high levels of intrusive ideation (IES>13) about the financial cost of care. Oral CML medicine was the greatest cost burden to participants. Because of the medical costs of CML, 33% reported depleting their savings; 20% borrowed against or used money from retirement; and 35% reported cutting their grocery expenses. Nine percent enrolled in a clinical trial that paid for most of their treatment expenses. About one-third used pharmaceutical assistance programs (30%) and co-pay assistance programs (38%). In order to reduce health care costs, 10% reported skipping dosages of medicine at least sometimes, and 14% postponed filling prescriptions. Twelve percent reported they postponed seeking psychological counseling or support. Half (51%) of participants did not know if they were eligible for Social Security Disability Insurance or Supplemental Security Income; 44% wished they had received more help with financial advice and assistance. Conclusion: CML places a financial burden on patients that is associated with patients taking measures that may significantly impact quality of life and may negatively affect treatment outcomes. Implications for future research and practice include the development and evaluation of interventions to enhance oncology team-patient communication and support (e.g., financial counseling and assistance) to help ensure that the financial burden of CML does not negatively impact the patient’s quality of life, course of cancer care, and health outcomes. Disclosures No relevant conflicts of interest to declare.
APA, Harvard, Vancouver, ISO, and other styles
32

Dadkhah, Mehdi, Tole Sutikno, and Shahaboddin Shamshirband. "Social Network Applications and Free Online Mobile Numbers: Real Risk." International Journal of Electrical and Computer Engineering (IJECE) 5, no. 2 (2015): 175. http://dx.doi.org/10.11591/ijece.v5i2.pp175-176.

Full text
Abstract:
Social network applications are being more widely used among users and new types of such applications are created by developers. Almost all users who use smart phones are users of such application. Major concern in these applications is privacy and security. We can name WhatsApp, Viber, Facebook, Telegram, Line, WeChat and Beetalk as the most popular applications. There are also websites which provide online numbers in order to receive SMS. The goal of this website is providing anonymous virtual phone number to protect users from spam. Also these sites provide different number from different countries and let people to can use them for different application. The services of these websites are divided into two groups: subscription services in which a unique number is assigned to the user by charging him/her and free services in which user can see the received messages of some online numbers without any registration.
APA, Harvard, Vancouver, ISO, and other styles
33

Ahn, Jong-chang, Suaini Sura, and Jong-Chol An. "Intention to donate via social network sites (SNSs)." Information Technology & People 31, no. 4 (2018): 910–26. http://dx.doi.org/10.1108/itp-12-2015-0307.

Full text
Abstract:
Purpose The purpose of this paper is to explore the differences in the external factors influencing intention to donate via social network sites (SNSs), and the online donation knowledge and awareness effect on the willingness to donate via SNS in the future between Malaysian and South Korean users. Design/methodology/approach In total, 288 samples’ data obtained from online survey using the snowball technique were analyzed through using cross-tabulation with χ2 tests and multiple regression analysis. Findings The results show that there is no significant difference between those countries regarding the online donation knowledge and awareness. However, the online donation knowledge and awareness significantly affect the willingness to donate via SNSs for South Korean, but not for Malaysian. As for Malaysian, the results reveal that only SNS features factor does significantly influence the attitude toward online donations. As for South Korean, the charity project and internet technology features factor significantly influence the attitude toward online donations. The attitude toward online donations of both countries influences on their intention to donate via SNS. Research limitations/implications The sample was gathered from certain regions in Malaysia and South Korea, and had slightly unbalanced characteristics (i.e. age), limiting the generalizability to the general population of both countries. Practical implications The findings suggest that non-profit organizations should consider the culture context in planning their future SNS donation program and focus on how to deal with the internet issues (e.g. trust, security), SNS features and charity project. As for Malaysian, promoting the internet and online donation awareness should be the priority before engaging in SNS donation program. Originality/value Whilst research on culture context in donation area is plentiful, the area of SNS donation remains underexplored. This paper offers an in-depth understanding of what influences SNS donation related to the identified culture context.
APA, Harvard, Vancouver, ISO, and other styles
34

Dong, Li Na. "Design of Computer Information Network Security System." Applied Mechanics and Materials 539 (July 2014): 305–9. http://dx.doi.org/10.4028/www.scientific.net/amm.539.305.

Full text
Abstract:
With the increasingly advanced computer information network, a great convenience for people's daily work and life at the same time, the network security problem arises. Network security is not only related to the enterprises, institutions and social groups, network information security, is also related to the national security and social stability, Involves many disciplines of computer science, network technology, communication technology, security technology and techniques. Solve the problem of computer network security has become the most important research topics in the field of computer science. Starting from the characteristics of the computer information network security and network security factors, a network security system designed set includes virus protection, dynamic password authentication, firewall access control, information encryption, intrusion detection and other protective measures for our computer the improvement and development of the information Network Security provides a useful reference.
APA, Harvard, Vancouver, ISO, and other styles
35

Thormann, Joan, Samuel Gable, Patricia Seferlis Fidalgo, and George Blakeslee. "Interaction, critical thinking, and social network analysis (SNA) in online courses." International Review of Research in Open and Distributed Learning 14, no. 3 (2013): 294. http://dx.doi.org/10.19173/irrodl.v14i3.1306.

Full text
Abstract:
<p>This study tried to ascertain a possible relationship between the number of student moderators (1, 2, and 3), online interactions, and critical thinking of K-12 educators enrolled in an online course that was taught from a constructivist approach. The course topic was use of technology in special education. Social network analysis (SNA) and measures of critical thinking (Newman, Webb, & Cochrane, 1995) were used to research and assess if there was a difference in interaction and critical thinking between 1, 2, or 3 student moderators who facilitated a forum discussion of an assignment in an online course. The same course was repeated over three years. Each year either 1, 2, or 3 students moderated. The analysis indicated more discussion per non-moderating student with the three student moderated group. Using SNA we found that there was only one noticeable difference among the three groups which was in the value of network centralization. Using critical thinking measures the three student moderator group scored higher in five of the eight critical thinking categories. Variations in instructor presence in the online courses may have influenced these findings.</p>
APA, Harvard, Vancouver, ISO, and other styles
36

Jayabalan, K., and B. Subramani. "A Survey on Online Social Networks: Applications, Threats and Solutions." Asian Journal of Computer Science and Technology 8, no. 2 (2019): 6–8. http://dx.doi.org/10.51983/ajcst-2019.8.2.2149.

Full text
Abstract:
Online social networks (OSNs) are playing crucial role in digital world today. OSNs are web applications that allow users to share their personal information, digital images and videos, and to inform others about online or real time world activities and events with people in their network. OSN’s are decentralized and distributed computer networks where users communicate with their friends and relatives through Internet services. The Smartphone has increase the situation for hacker’s to attacks end user data from OSNs. Behaviors of OSN users has been monitored for data analytics[1]. In this paper, we represent full review of the applications, different security level threats and privacy issues, which threaten the well-being of OSN users in general, and children in particular. In addition, we present an overview of existing solutions that can provide better protection, security, and privacy for OSN users[2]. We also offer few recommendations for OSN users, which can improve their security and privacy when using the online social networks.
APA, Harvard, Vancouver, ISO, and other styles
37

Prochnow, Tyler, Megan S. Patterson, Logan Hartnell, and M. Renée Umstattd Meyer. "Depressive symptoms associations with online and in person networks in an online gaming community: a pilot study." Mental Health Review Journal 25, no. 1 (2020): 21–33. http://dx.doi.org/10.1108/mhrj-11-2019-0044.

Full text
Abstract:
Purpose Increases in video game use have led to mental health concerns, citing greater risk for depressive symptoms (DS) and reduced “in-real-life” (IRL) social involvement. However, recent studies have uncovered potential social benefits for online gaming. Many games provide avenues to extend real life relationships and make new online friendships. The purpose of this pilot study is to use social network analysis to determine associations between connections and DS in a gaming community. Design/methodology/approach As a pilot study, members of an online gaming site were asked to report demographic characteristics, DS, IRL social support, online social support and IRL people and members of the online community with whom they spoke to about important life matters. Multi-level modeling was used to parse variance described by demographic characteristics, IRL measures and online measures. Linear network autocorrelation modeling (LNAM) was used to determine relationships between network connections and DS. Findings Members (n = 37; µ = 24.76 years old, SD = 6.55; 100% male; 89.2% white) on average felt DS’ “not at all” to “several days” over the past two weeks. Multi-level modeling including online network measures explained 50% of variance (R2 = 0.50, F (9,27) = 2.98, p = 0.01); online connections were associated with DS (ß = 0.46). LNAM indicated DS were associated with IRL support (ß = −2.66), IRL connections (ß = 1.81), online support (ß = 2.40) and network effects (ß = 0.06), which indicates that a gamer’s DS were similar to those of their online connections. Originality/value Members with more DS may be seeking help via online channels. This may be important for future research to consider alternative forms of help-seeking behavior.
APA, Harvard, Vancouver, ISO, and other styles
38

Kamoru, Balogun Abiodun, Azmi Bin Jaafar, Masrah Azrifah Azmi Murad, and Marzanah A. Jabar. "Understanding Security Threats in Spam Detection on Social Networks." Circulation in Computer Science 2, no. 5 (2017): 18–22. http://dx.doi.org/10.22632/ccs-2017-252-19.

Full text
Abstract:
Social network has become a very popular way for internet users to communicate and interact online. The socia; networks provide a platform to maintain a contact with friends. Increasing social network’s popularity allows all of them to collect large amounts of personal details about their users. Globally, the issue of identifying spammers have received great attention due to its practical relevance in the field of social network analysis. Social network community users are fed with irrelevant information while surfing, due to spammer's activity. Spam pervades any information system such as e-mail or web, social, blog or reviews platform. The aim of this paper is to examine previous works in the field of spam detection in social networks, the study attempts to review various spam detection frameworks which details about the detection and elimination of spam's in various sources, By classification and Clustering Method of spam detection and by raising security awareness among the users of social networks and stake holders , by prescribing a strategic approach or data mining approach for analyzing the nature of spam detection on social networks.
APA, Harvard, Vancouver, ISO, and other styles
39

Gnanasekar, A. "Detecting Spam Bots on Social Network." Revista Gestão Inovação e Tecnologias 11, no. 2 (2021): 850–60. http://dx.doi.org/10.47059/revistageintec.v11i2.1719.

Full text
Abstract:
Bots have made an appearance on social media in a variety of ways. Twitter, for instance, has been particularly hard hit, with bots accounting for a shockingly large number of its users. These bots are used for nefarious purposes such as disseminating false information about politicians and inflating celebrity expectations. Furthermore, these bots have the potential to skew the results of conventional social media research. With the multiple increases in the size, speed, and style of user knowledge in online social networks, new methods of grouping and evaluating such massive knowledge are being explored. Getting rid of malicious social bots from a social media site is crucial. The most widely used methods for identifying fraudulent social bots focus on the quantitative measures of their actions. Social bots simply mimic these choices, leading to a low level of study accuracy. Transformation clickstream sequences and semi-supervised clustering were used to develop a new technique for detecting malicious social bots. This method considers not only the probability of user activity clickstreams being moved, but also the behavior's time characteristic. The detection accuracy for various kinds of malware social bots by the detection technique assisted transfer probability of user activity clickstreams will increase by a mean of 12.8 percent, as per results from our research on real online social network sites, compared to the detection method funded estimate of user behaviour.
APA, Harvard, Vancouver, ISO, and other styles
40

Black, Erik W., Lindsay A. Thompson, W. Patrick Duff, Kara Dawson, Heidi Saliba, and Nicole M. Paradise Black. "Revisiting Social Network Utilization by Physicians-in-Training." Journal of Graduate Medical Education 2, no. 2 (2010): 289–93. http://dx.doi.org/10.4300/jgme-d-10-00011.1.

Full text
Abstract:
Abstract Objective To measure and compare the frequency and content of online social networking among 2 cohorts of medical students and residents (2007 and 2009). Methods Using the online social networking application Facebook, we evaluated social networking profiles for 2 cohorts of medical students (n = 528) and residents (n = 712) at the University of Florida in Gainesville. Objective measures included existence of a profile, whether it was made private, and whether any personally identifiable information was included. Subjective outcomes included photographic content, affiliated social groups, and personal information not generally disclosed in a doctor-patient encounter. We compared our results to our previously published and reported data from 2007. Results Social networking continues to be common amongst physicians-in-training, with 39.8% of residents and 69.5% of medical students maintaining Facebook accounts. Residents' participation significantly increased (P < .01) when compared to the 2007 data. Individuals in the 2009 cohort had significantly more “friends” (P < .01), belonged to more “groups” (P < .01), and were more likely to limit public access to their profiles through the use of privacy settings (P < .01) than the individuals in the 2007 cohort. Discussion Online social networking application use by physicians-in-training remains common. While most now limit access to their profiles, personal profiles that still allow public access exhibited a few instances of unprofessional behavior. Concerns remain related to the discovery of content in violation of patient privacy and the expansive and impersonal networks of online “friends” who may view profiles.
APA, Harvard, Vancouver, ISO, and other styles
41

Shetty, Nisha P., Balachandra Muniyal, and Saleh Mowla. "Policy resolution of shared data in online social networks." International Journal of Electrical and Computer Engineering (IJECE) 10, no. 4 (2020): 3767. http://dx.doi.org/10.11591/ijece.v10i4.pp3767-3776.

Full text
Abstract:
Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners.
APA, Harvard, Vancouver, ISO, and other styles
42

Sun, Jian, Guanhua Huang, Arun Kumar Sangaiah, Guangyang Zhu, and Xiaojiang Du. "Towards Supporting Security and Privacy for Social IoT Applications: A Network Virtualization Perspective." Security and Communication Networks 2019 (March 14, 2019): 1–15. http://dx.doi.org/10.1155/2019/4074272.

Full text
Abstract:
Network function virtualization (NFV) is a new way to provide services to users in a network. Different from dedicated hardware that realizes the network functions for an IoT application, the network function of an NFV network is executed on general servers, and in order to achieve complete network functions, service function chaining (SFC) chains virtual network functions to work together to support an IoT application. In this paper, we focus on a main challenge in this domain, i.e., resource efficient provisioning for social IoT application oriented SFC requests. We propose an online SFC deployment algorithm based on the layered strategies of physical networks and an evaluation of physical network nodes, which can efficiently reduce bandwidth resource consumption (OSFCD-LSEM) and support the security and privacy of social IoT applications. The results of our simulation show that our proposed algorithm improves the bandwidth carrying rate, time efficiency, and acceptance rate by 50%, 60%, and 15%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
43

Ho, Thanh, and Phuc Do. "A New Model for Discovering Communities of Users on Social Network." Science and Technology Development Journal 19, no. 1 (2016): 81–94. http://dx.doi.org/10.32508/stdj.v19i1.613.

Full text
Abstract:
The trend of technological development and increasing varieties of social media lead to the changes in people’s behaviors in society and forming online communities. Changes of human’s behaviors make many models of business, marketing, services and even the field of education, security, politicsl change from approaches to user management. Community of users on social networks influence behaviors, habits of each user involved in the community. Therefore, exploring community on social networks from many different data sources via analyzing exchanged contents will help know the user community’s behaviors which are reflected in the content and topics that users are interested in discussing in messages. In this paper, we propose a new model of discovering communities of users on social networks based on the topic model combined with Kohonen network. In the proposed model, we focus on discovering communities of users on social networks and analyzing the interested topics change of online community in each period of time. The proposed model is experimented with a set of vectors in interested topics of online users in higher education field.
APA, Harvard, Vancouver, ISO, and other styles
44

Agah, Afrand, and Mehran Asadi. "Influence and Information Flow in Online Social Networks." International Journal of Virtual Communities and Social Networking 9, no. 4 (2017): 1–17. http://dx.doi.org/10.4018/ijvcsn.2017100101.

Full text
Abstract:
This article introduces a new method to discover the role of influential people in online social networks and presents an algorithm that recognizes influential users to reach a target in the network, in order to provide a strategic advantage for organizations to direct the scope of their digital marketing strategies. Social links among friends play an important role in dictating their behavior in online social networks, these social links determine the flow of information in form of wall posts via shares, likes, re-tweets, mentions, etc., which determines the influence of a node. This article initially identities the correlated nodes in large data sets using customized divide-and-conquer algorithm and then measures the influence of each of these nodes using a linear function. Furthermore, the empirical results show that users who have the highest influence are those whose total number of friends are closer to the total number of friends of each node divided by the total number of nodes in the network.
APA, Harvard, Vancouver, ISO, and other styles
45

Rababah, Osama, and Bassam Alqudah. "Building a Trust Model for Social Network." Modern Applied Science 12, no. 4 (2018): 69. http://dx.doi.org/10.5539/mas.v12n4p69.

Full text
Abstract:
The revolution in information technology and the use of the internet changed the lifestyle of people. A major change was in the way of shopping. Companies started to offer their products online using social network s and people started to buy from the internet. Using social network has many benefits to the users starting from exploring a large variety of products to the very first way of ordering and the availability of the products 24 hours a day. One of the main problems that is found in using a social network is trusting the using social network social network s. the student concern about trusting to buy from the using social network social network s. Trust is a major concern for the merchant too; his concern is how to gain the student trust and to keep it. Many factors play a major role in acquiring the student trust in the online market. These factors rely on the social network characteristics such as design, interactivity and age and other factors vary from the social network quality, service quality, security policy of the social network, the privacy policy, the guarantee offered, the satisfaction of the user, the ease of use, the risk aversion and the culture factors. This study introduces the trusting affecting factors mentioned above and their effect on the trustworthiness factors (ability, benevolence, and integrity) a trust model has been built to show the relation between these factors and the trustworthiness factors.
APA, Harvard, Vancouver, ISO, and other styles
46

Gallova, Viktoria, Marek Palasinski, Neil Shortland, Michael Humann, and Lorraine Bowman Grieve. "Anxiety about digital security and terrorism, and support for counter-terror measures." Safer Communities 17, no. 3 (2018): 156–66. http://dx.doi.org/10.1108/sc-02-2018-0007.

Full text
Abstract:
PurposeThe purpose of this paper is to determine the potential predictors of anxiety about digital security, terrorist threats and support for high-tech counter measures.Design/methodology/approachIn Study 1, 195 participants indicated their anxiety about digital security systems, data protection and social networking sites. In Study 2, 107 participants indicated their anxiety about domestic terrorism, international terrorism and extremist groups. In Study 3, 261 participants indicated their support for high-tech counter-terrorism measures.FindingsStudy 1 suggests that whereas anxiety about digital security systems, data protection and social networking sites was positively predicted by right-wing authoritarianism, anxiety about social networking was also negatively predicted by time spent online. Study 2 shows that time spent online was a negative predictor of anxiety about domestic terrorism. Study 3 indicates that the strongest positive predictor of support for all the measures was right-wing authoritarianism, followed by national identity.Research limitations/implicationsThe findings show the relevance of terror management theory to digital security and counter-terrorism.Practical implicationsIt appears that right-wing authoritarianism and national identity may serve as mechanisms for people to subjectively counter the presented threats. This notion may inform relevant policy and practice aimed at making communities safer and potentially helps introduce counter-terror measures with less public backlash.Social implicationsWhen designing counter-terror measures, policy makers should consider compound national identities (e.g. Catalan or Basque people).Originality/valueThe paper makes contribution to under-explored areas of terrorism anxiety and support for counter-terror measures.
APA, Harvard, Vancouver, ISO, and other styles
47

Maireder, Axel, Brian E. Weeks, Homero Gil de Zúñiga, and Stephan Schlögl. "Big Data and Political Social Networks." Social Science Computer Review 35, no. 1 (2016): 126–41. http://dx.doi.org/10.1177/0894439315617262.

Full text
Abstract:
Social media have changed the way citizens, journalists, institutions, and activists communicate about social and political issues. However, questions remain about how information is diffused through these networks and the degree to which each of these actors is influential in communicating information. In this study, we introduce two novel social network measures of connection and information diffusion that help shed light on patterns of political communication online. The Audience Diversity Score assesses the diversity of a particular actor’s followers and identifies which actors reach different publics with their messages. The Communication Connector Bridging Score highlights the most influential actors in the network who are potentially able to connect different spheres of communication through their information diffusion. We apply and discuss these measures using Twitter data from the discussion regarding the Transatlantic Trade Investment Partnership in Europe. Our results provide unique insights into the role various actors play in diffusing political information in online social networks.
APA, Harvard, Vancouver, ISO, and other styles
48

R, Balamurugan, Dhivakar M, Muruganantham G, and Ramprakash S. "Securing Heterogeneous Privacy Protection in Social Network Records based Encryption Scheme." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 3 (2019): 10–13. http://dx.doi.org/10.17762/ijritcc.v7i3.5249.

Full text
Abstract:
This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.
APA, Harvard, Vancouver, ISO, and other styles
49

Batool, Zahra, Muhammad Junaid, Muhammad Naeem, et al. "Identifying Disease Comorbidity Patterns Using Centrality Measures in Computing." Revista Gestão Inovação e Tecnologias 11, no. 4 (2021): 2964–75. http://dx.doi.org/10.47059/revistageintec.v11i4.2332.

Full text
Abstract:
Social network analysis has been increasingly employed to study patterns in diverse areas of disciplines such as crowd management, air passenger and freight transportation, business modelling and analysis, online social movements and bioinformatics. Over the years, human disease networks have been studied to analyze Human Disease, Genotype, and Phenotype networks. This study explores human Disease Network based on their symptoms by employing different social network analysis such as centrality measures of network, community detection, overlapping communities. We studied relationships of symptoms with diseases on meso-level in order to detect comorbidity pattern of communities in disease network. This help us to understand the underlying patterns of diseases based on symptoms and find out that how different disease communities are correlated by detecting overlapping communities.
APA, Harvard, Vancouver, ISO, and other styles
50

Zhang, Lanfang, Zhiyong Zhang, and Ting Zhao. "A Novel Spatio-Temporal Access Control Model for Online Social Networks and Visual Verification." International Journal of Cloud Applications and Computing 11, no. 2 (2021): 17–31. http://dx.doi.org/10.4018/ijcac.2021040102.

Full text
Abstract:
With the rapid development of mobile internet, a large number of online social networking platforms and tools have been widely applied. As a classic method for protecting the privacy and information security of social users, access control technology is evolving with the spatio-temporal change of social application requirements and scenarios. However, nowadays there is a lack of effective theoretical model of social spatio-temporal access control as a guide. This paper proposed a novel spatio-temporal access control model for online social network (STAC) and its visual verification, combined with the advantages of discretionary access control, using formal language to describe the access control rules based on spatio-temporal, and real-life scenarios for access control policy description, realizes a more fine-grained access control mechanism for social network. By using the access control verification tool ACPT developed by NIST to visually verify the proposed model, the security and effectiveness of the STAC model are proved.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography