Social Network Security and Privacy Survey
1,797 Followers
Recent papers in Social Network Security and Privacy Survey
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the... more
Internet Privacy and Myths Third Edition 2016
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
International Journal of Wireless Network Security (IJWNS) http://flyccs.com/jounals/IJWNS/Home.html Scope International Journal of Wireless Network Security (IJWNS) is a open access journal that publishes articles which contribute... more
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
Os estudos das redes sociais como aplicações, meios e plataformas que amoldam a configuração dos nossos perfis e identidades digitais, para além das suas potencialidades para influenciar as nossas identidades online – e offline – (Van... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more
Some theoretical and practical aspects of the legal mechanism of the mutual approximation and interpenetration of the Ukrainian social security system and the European Community are clarified. The mechanism of the implementation into... more
Few would deny that monitoring employees is a necessary part of doing business. The very act of paying someone for services would necessitate, in a competitive environment, that the product produced or time spent working be observed.... more
In this article, after a brief survey of various definitions, I will offer and defend a control over access and use account of privacy. My goal is to provide a normative definition of privacy although I will sketch a descriptive account... more
In this paper I will offer several arguments in support of the view that individuals have moral claims to control personal information. Coupled with rights to control access to one's body, capacities, and powers, or physical privacy... more
€50.000.000 that fined to Google by the French authorities in consequence of the breach of the GDPR demonstrates the GDPR’s quick entrance to the field, which has been in force for only less than a year. Thereby, the first major breach... more
14 th International Conference on Networks & Communications (NeCoM 2022) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Computer Networks & Data Communications.... more
- by International Journal of Ad hoc, Sensor & Ubiquitous Computing Journal
- Wireless Sensor Network Security, Network Security (Networks), Networks Security, Computer and Network Security Information Assurance and Security Cyber Security Access Control in Collaborative, Mobile, Pervasive and Grid Systems Semantic Web and Security Ontologies
I have argued elsewhere that individuals have moral privacy rights that limit the surveillance activities of governments. While not absolute, privacy rights shield individuals from the prying eyes and ears of neighbors, corporations, and... more
This article examines the evolution of social security research from a theoretical and empirical perspective. This is done through an extensive review and analysis of publications from the Journal of International Social Security Review... more
In this paper we describe Turtle, a peer-to-peer architecture for safe sharing of sensitive data. The truly revolutionary aspect of Turtle rests in its novel way of dealing with trust issues: while existing peer-to-peer architectures with... more
Le géant de Web a annoncé supprimer désormais toutes les données de recherche faites par les internautes vieilles de plus de 18 mois. Une mesure en trompe l’oeil.
The number of services and smart devices which require context is increasing, and there is a clear need for new security policies which provide security that is convenient and flexible for the user. In particular, there is an urgent need... more
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate-or even prevent-some of the more drastic... more
A Mobile Ad hoc Network (MANET) is a collection of mobile stations with wireless interfaces which form a temporary network without using any central administration. MANETs are more vulnerable to attacks because they have some specific... more
AMAZON ECHO IN DORM ROOMS AND PRIVACY CONCERNS Aug-28-2018 As the fall semester begins, students of Saint Louis University will soon find a new amenity, the Amazon Echo Dot, in each of their dorm rooms. Echo Dot is a voice assistant... more
The Internet today connects about 40% of the world population. Half of these are living outside the advanced economies, often in some countries that are quickly climbing the developmental ladder, with diverse populations and inarguable... more
The phenomenon of big data includes technological (new opportunities), business (application), and social aspect. The social aspect applies to the social consequences of the use of big data methods, in particular, those related to the... more
This paper argues that individuals do, in a sense, own or have exclusive claims to control their personal information and body parts. It begins by sketching several arguments that support presumptive claims to informational privacy,... more
HUMAN ERRORS AND THE COMPUTER FRAUD AND ABUSE ACT (CFAA) Mar-14-2018 Humans and computers are alike in at least one sense –both could malfunction or be compromised. On Feb. 28th, the U.S. Marine Forces Reserve announced a data breach... more
International Journal of Wireless Networks Systems (IJWNS)is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
Abstract: Participation in social networking sites has dramatically increased in recent years. Social networking sites like Facebook1 or MySpace allow users to keep in touch with their friends, communicate and share content, ideas,... more
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
International Journal of Wireless Networks Systems (IJWNS)is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Wireless & Mobile Networks. The journal focuses on all... more
Online Social Networking has gained tremendous popularity amongst the masses. It is usual for the users of Online Social Networks (OSNs) to share information with friends however they lose privacy. Privacy has become an important concern... more
Now a days, to know the users location information on devices having GPS facility. When user’s location is provided to LBS, it is possible to user to know all location dependent information like location of friends or Nearest Restaurant,... more
This seminar provides an overview of evidence collected across Europe’s 27 Member States (excluding Croatia) on citizens’ preferences between security and privacy in three real-life contexts: (1) Choice of Internet service provider, (2)... more