Social Networking Security and Privacy
6,703 Followers
Recent papers in Social Networking Security and Privacy
engstler theorizes a continuum of 6 compliance positions for educators (Avoidance, Ignorance, Knowledgeable Non-Compliance, Approaching Compliance, Establishing Compliance, & Full Compliance) with regard to the application of British... more
Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio... more
While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual... more
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. In this paper we focus on the popular notion of kanonymization as... more
Este livro é destinado a estudantes, pesquisadores, profissionais e demais interessados em comércio eletrônico (e-commerce), e faz um resgate histórico do surgimento das compras on-line, sua evolução no decorrer dos anos, além de explanar... more
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the... more
[email protected] published in Science Magazine 17/04/2020 https://science.sciencemag.org/content/317/5842/1178/tab-e-letters 1. Does privacy exists? Analysing software business rules that impact privacy and cybersecurity is... more
This paper analyzes the role of ethics, privacy and technology in Netflix's South Korean survival drama, Squid Game (2021). The show's popularity hinges on its mordant critique of capitalism, particularly the global disappearance of the... more
Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data... more
The word Social Credit System (SCS) is an ambitious governance reform program launched by China in 2014. What is new in this system is an effort to monitor, quantify, measure, and rank corporate behaviour. By unlocking the potential of... more
Internet Privacy and Myths Third Edition 2016
Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data... more
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
Due to the increasing rate of crimes there is a need of system that will detect and predict crimes at dynamic time. The aim of this survey is to study Data Mining techniques that will help to detect and predict crimes using association... more
This extensive 20,000 word research report explores the attitudes of Internet users in the Middle East and North Africa (MENA) region to issues of cybersafety, online security and data privacy. The research covers five areas: 1.... more
A cross-cultural explanatory sequential mixed method design was utilized to investigate the implementability of social networking services for educational purposes. It was aimed to shed light on the nature of relationship between the use... more
There is a widespread impression that younger people are less concerned with privacy than older people. For example, Facebook founder Mark Zuckerberg justified changing default privacy settings to allow everyone to see and search for... more
China’s Social Credit System (SCS) has captured the imagination and power of big data technology. Launched at the national level in 2014, the system’s aim is to assess the trustworthiness of Chinese citizens in keeping their promises and... more
Social networking is a social structure that allow user to interact and work collaboratively with other users. Today social networking websites are most popular as well as widely used among people of all age group to share interests,... more
Reflecting on the thousands of diverse research studies of social media representation and digital privacy, this article presents a comprehensive summary of online personal strategies. First, the evolution of academic concepts about... more
This is a comparative study between Kenya and the United Kingdom on Data Protection Laws and their role in preventing Cyber Crime. Kindly note this thesis was written in 2010 prior to the enactment of the new Constitution which has better... more
The aggressive collection and tracking of personal information on social media continues to raise information privacy concerns, which is gaining the interest of lawmakers, organizations, researchers, and consumers. While information... more
In seinem Werk Überwachen und Strafen beschreibt Michel Foucault 1975 das von Jeremy Bentham erdachte Panopticon und visualisiert metaphorisch anhand dieses Konzepts die Funktionsweise einer Disziplinargesellschaft. Wer das Gefühl hat... more
The current research paper based on two main research objectives; the first was to study the phenomenon of "Self-disclosure through social networking sites" among Egyptians in terms of social impact & benefits to self-inclination of... more
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
Il presente lavoro si propone di offrire un’analisi e un commento – in chiave critica – dei limiti normativi apposti dal d.lgs. 33/2013 al fine di realizzare un opportuno bilanciamento tra la primaria finalità (ispiratrice del decreto)... more
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
Os estudos das redes sociais como aplicações, meios e plataformas que amoldam a configuração dos nossos perfis e identidades digitais, para além das suas potencialidades para influenciar as nossas identidades online – e offline – (Van... more
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
Course lecture presentation Capitol Technology University course IA 684 Complementary Security. The course provides a foundation for the basic elements for personnel security as this discipline interfaces with information technology. The... more
Nach anfänglicher Zurückhaltung nutzen immer mehr Regierung- und Verwaltungsbehörden auf allen Ebenen des Gemeinwesens soziale Plattformen auf dem Internet. Ob Twitter, Facebook oder YouTube, auf zahlreichen Kanälen bemühen sich Bund,... more
The decision of the European Court of Justice on the right to be forgotten should dramatically change the internet environment. Google, as well as all the other search engine operators, has implemented a search removal request aimed at... more
In recent years, the number of active users on social networks has increased dramatically. According to a document presented by Goldman Sachs Group Inc., a global investment banking, from January 2011 Facebook has more than 600 million... more
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more