Skip to main content
    • by 
    •   59  
      PrivacyFighting and Preventing Corruption through LawPolitical ScienceSurveillance (Sociology)
engstler theorizes a continuum of 6 compliance positions for educators (Avoidance, Ignorance, Knowledgeable Non-Compliance, Approaching Compliance, Establishing Compliance, & Full Compliance) with regard to the application of British... more
    • by 
    •   7  
      Educational TechnologyTeacher EducationPrivacyPrivacy (Law)
Mobile operators currently prefer optimizing their radio networks via re-homing or cutting over the cell sites in 2G or 3G networks. The core network, as the parental part of radio network, is inevitably impacted by the re-homing in radio... more
    • by 
    •   27  
      Social NetworkingComputer Networks3GPP (UMTS)Mobile social networking
While players are enjoying casual mobile games like Candy Crush Saga, we also must negotiate elements that have been brought to the forefront by the intersection of networked play environments and casual game technologies. While casual... more
    • by 
    •   11  
      Data MiningPrivacyVideo Games and LearningComputer Games Technology
With an abundance of social network data being released, the need to protect sensitive information within these networks has become an important concern of data publishers. In this paper we focus on the popular notion of kanonymization as... more
    • by 
    •   12  
      Computer ScienceSocial NetworksGraph TheoryPrivacy
Este livro é destinado a estudantes, pesquisadores, profissionais e demais interessados em comércio eletrônico (e-commerce), e faz um resgate histórico do surgimento das compras on-line, sua evolução no decorrer dos anos, além de explanar... more
    • by 
    •   38  
      MarketingInformation SecurityInternet StudiesPrivacy
Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data... more
    • by  and +1
    •   13  
      Information SystemsInformation TechnologyInformation Communication TechnologyPERSONAL DATA PROTECTION
This book presents the latest research on the challenges and solutions affecting the equilibrium between freedom of speech, freedom of information, information security, and the right to informational privacy. Given the complexity of the... more
    • by 
    •   26  
      Business EthicsInformation TechnologyLawPhilosophy
This article examines the evolution of social security research from a theoretical and empirical perspective. This is done through an extensive review and analysis of publications from the Journal of International Social Security Review... more
    • by  and +1
    •   9  
      Pensions and retirement incomeSocial ProtectionSocial/Behavioral Sciences & SecuritySocial Security
[email protected] published in Science Magazine 17/04/2020 https://science.sciencemag.org/content/317/5842/1178/tab-e-letters 1. Does privacy exists? Analysing software business rules that impact privacy and cybersecurity is... more
    • by 
    •   5  
      PrivacySocial Networking Security and PrivacyPrivacy and data protectionCyber Security
    • by 
    •   15  
      Business EthicsComputer ScienceInformation TechnologyPhilosophy
This paper analyzes the role of ethics, privacy and technology in Netflix's South Korean survival drama, Squid Game (2021). The show's popularity hinges on its mordant critique of capitalism, particularly the global disappearance of the... more
    • by 
    •   18  
      AlgorithmsEthicsTechnologyMedia Studies
Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data... more
    • by 
    •   13  
      Information SystemsInformation TechnologyInformation Communication TechnologyPERSONAL DATA PROTECTION
The word Social Credit System (SCS) is an ambitious governance reform program launched by China in 2014. What is new in this system is an effort to monitor, quantify, measure, and rank corporate behaviour. By unlocking the potential of... more
    • by 
    •   16  
      Doing Business in ChinaChina studiesSocial Networking Security and PrivacyPrivacy and data protection
Internet Privacy and Myths Third Edition 2016
    • by 
    •   31  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
Users tend to utilize bad or weak passwords with memorable characteristics such as simple words from the dictionary and easy to remember sequence of numbers from birthdays. Poor or bad password habits lead to compromise of personal data... more
    • by 
    •   13  
      Information SystemsInformation TechnologyInformation Communication TechnologyPERSONAL DATA PROTECTION
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and... more
    • by 
    •   13  
      PrivacyRFID Security and PrivacyInformation Security and PrivacyPrivacy (Law)
    • by 
    •   10  
      TechnologyPrivacySocial MediaSecurity and Privacy
Due to the increasing rate of crimes there is a need of system that will detect and predict crimes at dynamic time. The aim of this survey is to study Data Mining techniques that will help to detect and predict crimes using association... more
    • by 
    •   8  
      Data AnalysisInformation Security and PrivacyCloud ComputingSocial Networking Security and Privacy
This extensive 20,000 word research report explores the attitudes of Internet users in the Middle East and North Africa (MENA) region to issues of cybersafety, online security and data privacy. The research covers five areas: 1.... more
    • by 
    •   12  
      Internet StudiesMiddle East StudiesPrivacyInformation Security and Privacy
A cross-cultural explanatory sequential mixed method design was utilized to investigate the implementability of social networking services for educational purposes. It was aimed to shed light on the nature of relationship between the use... more
    • by 
    •   24  
      Social NetworksPersonalityMixed MethodsGrounded Theory
This explorative study aims to gain insight about which privacy settings and features on the interfaces are commonly used by Facebook users. User data was collected using an online survey. Based on the survey data, a set of the commonly... more
    • by  and +1
    • Social Networking Security and Privacy
There is a widespread impression that younger people are less concerned with privacy than older people. For example, Facebook founder Mark Zuckerberg justified changing default privacy settings to allow everyone to see and search for... more
    • by 
    •   9  
      PrivacyFacebookYoung People and The InternetSocial Networking Sites (SNS)
China’s Social Credit System (SCS) has captured the imagination and power of big data technology. Launched at the national level in 2014, the system’s aim is to assess the trustworthiness of Chinese citizens in keeping their promises and... more
    • by 
    •   15  
      PrivacyCredit ScoringSurveillance StudiesFreedom of Information
Social networking is a social structure that allow user to interact and work collaboratively with other users. Today social networking websites are most popular as well as widely used among people of all age group to share interests,... more
    • by 
    •   8  
      Social NetworkingSocial Networking Sites (SNS)Academic Social NetworkingSocial Networking Services
    • by 
    •   38  
      Information SecurityDatabase SystemsPrivacyNetwork Security
Reflecting on the thousands of diverse research studies of social media representation and digital privacy, this article presents a comprehensive summary of online personal strategies. First, the evolution of academic concepts about... more
    • by 
    •   20  
      SociologyComputer ScienceInformation ScienceNew Media
This is a comparative study between Kenya and the United Kingdom on Data Protection Laws and their role in preventing Cyber Crime. Kindly note this thesis was written in 2010 prior to the enactment of the new Constitution which has better... more
    • by 
    •   5  
      Information TechnologyIntellectual Property LawSocial Networking Security and PrivacyPrivacy and data protection
The aggressive collection and tracking of personal information on social media continues to raise information privacy concerns, which is gaining the interest of lawmakers, organizations, researchers, and consumers. While information... more
    • by 
    •   4  
      PrivacyComputer-Mediated CommunicationSocial MediaSocial Networking Security and Privacy
In seinem Werk Überwachen und Strafen beschreibt Michel Foucault 1975 das von Jeremy Bentham erdachte Panopticon und visualisiert metaphorisch anhand dieses Konzepts die Funktionsweise einer Disziplinargesellschaft. Wer das Gefühl hat... more
    • by 
    •   23  
      AlgorithmsPrivacyPropagandaSurveillance Studies
"Today’s social networks are plagued by numerous types of malicious profiles, ranging from bots to sexual predators. We present a novel method for the detection of these malicious profiles by only using the social network’s own... more
    • by  and +1
    •   6  
      Social NetworksSocial Network Analysis (SNA)Intrusion Detection SystemsSocial Networking Security and Privacy
The current research paper based on two main research objectives; the first was to study the phenomenon of "Self-disclosure through social networking sites" among Egyptians in terms of social impact & benefits to self-inclination of... more
    • by 
    •   2  
      Social Networking Security and PrivacyEgyptians
Il trattamento dei cd. Big Data, per conformarsi al Regolamento europeo sulla protezione dei dati personali, richiede un'indagine preliminare volta a individuare quali siano le misure organizzative e tecniche idonee alla corretta... more
    • by 
    •   19  
      PrivacyCommunication Privacy ManagementRFID Security and PrivacyInformation Security and Privacy
The emerging of new technology is making easier for people to access things in seconds just like the platform of the internet as it has become a crucial part of everyone's life. It enables people to share information worldwide very... more
    • by 
    •   13  
      Risk and VulnerabilityComputer SecurityCyber crimeSocial Networking Security and Privacy
Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN... more
    • by 
    •   7  
      Social NetworksInformation Security and PrivacySurveySocial Networking Security and Privacy
The goal of the book is to present the latest research on the new challenges of data technologies. It will offer an overview of the social, ethical and legal problems posed by group profiling, big data and predictive analysis and of the... more
    • by  and +1
    •   158  
      PhilosophyPolitical PhilosophyFree Will, Moral ResponsibilityDigital Divide
Il presente lavoro si propone di offrire un’analisi e un commento – in chiave critica – dei limiti normativi apposti dal d.lgs. 33/2013 al fine di realizzare un opportuno bilanciamento tra la primaria finalità (ispiratrice del decreto)... more
    • by 
    •   32  
      PrivacyDemocratic TheoryPERSONAL DATA PROTECTIONDemocracy
    • by 
    •   2  
      Privacy (Law)Social Networking Security and Privacy
Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via... more
    • by  and +1
    •   12  
      Information Security and PrivacyCloud ComputingSocial Networking Security and PrivacyAdvanced Persistent Threats
Ao analisar os comportamentos dos utilizadores através das mídias sociais, Hermida (2014) conclui que nestes ambientes observa-se claramente a natural predisposição humana para partilhar. Neste sentido, Rheingold (2012) discrimina cinco... more
    • by 
    •   29  
      PrivacyOnline CommunitiesOnline social networksCommunication Privacy Management
Os estudos das redes sociais como aplicações, meios e plataformas que amoldam a configuração dos nossos perfis e identidades digitais, para além das suas potencialidades para influenciar as nossas identidades online – e offline – (Van... more
    • by 
    •   32  
      Social MovementsSocial TheoryNew MediaDigital Humanities
Wireless communications, nowadays, becomes a vital element of people's daily life. Providing global connectivity in future communication systems via the heterogeneous network opens up many research topics to investigate potentialities,... more
    • by 
    •   17  
      Wireless CommunicationsNetwork SecurityComputer NetworksWireless Sensor Network Security
Course lecture presentation Capitol Technology University course IA 684 Complementary Security. The course provides a foundation for the basic elements for personnel security as this discipline interfaces with information technology. The... more
    • by 
    •   11  
      Information TechnologyManagement Information SystemsInformation SecurityNetwork Security
Nach anfänglicher Zurückhaltung nutzen immer mehr Regierung- und Verwaltungsbehörden auf allen Ebenen des Gemeinwesens soziale Plattformen auf dem Internet. Ob Twitter, Facebook oder YouTube, auf zahlreichen Kanälen bemühen sich Bund,... more
    • by 
    •   5  
      Political communicationSocial MediaPublic Relations & Social MediaPrivacy (Law)
The decision of the European Court of Justice on the right to be forgotten should dramatically change the internet environment. Google, as well as all the other search engine operators, has implemented a search removal request aimed at... more
    • by 
    •   6  
      PrivacyPERSONAL DATA PROTECTIONISP LiabilitySocial Networking Security and Privacy
In recent years, the number of active users on social networks has increased dramatically. According to a document presented by Goldman Sachs Group Inc., a global investment banking, from January 2011 Facebook has more than 600 million... more
    • by 
    •   3  
      Social MediaSocial Networking Security and PrivacyEU law and politics on data protection and privacy
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications .The journal... more
    • by 
    •   30  
      Wireless CommunicationsNetwork SecuritySensor Network SecurityNext Generation Internet Research
Privacy has been a sensitive question lurking over the head of Indian administrators who have been equally reluctant and ignorant about answering the same. The advent of Aadhaar Act in 2016 and Government's mandate of linking Aadhaar with... more
    • by 
    •   37  
      Risk Management and InsuranceLawCriminal LawConstitutional Law