Filters








52,298 Hits in 4.9 sec

Insider Threat: Enhancing BPM through Social Media

Dimitris Gritzalis, Vasilis Stavrou, Miltiadis Kandias, George Stergiopoulos
2014 2014 6th International Conference on New Technologies, Mobility and Security (NTMS)  
We discuss their pros and cons and propose a monitoring approach that aims at mitigating the insider threat.  ...  We conclude with some observations on the monitoring results (i.e. psychometric evaluations from the social media analysis) concerning privacy violations and argue that deployment of such systems should  ...  Thus, we examine approaches used to enhance business process security, under the prism of insider threat mitigation via a) psychosocial approaches that predict malevolent behavior and b) monitoring techniques  ... 
doi:10.1109/ntms.2014.6814027 dblp:conf/ntms/GritzalisSKS14 fatcat:ehl7hqetojendk55f3paes5vvm

Socio-Technical Mitigation Effort to Combat Cyber Propaganda: A Systematic Literature Mapping

Aimi Nadrah Maseri, Azah Anir Norman, Christopher Ifeanyi Eke, Atif Ahmad, Nurul Nuha Abdul Molok
2020 IEEE Access  
Besides, the study provides a brief review of cyber propaganda detection using classification techniques.  ...  Hence, it has set forth applicable research focus on the areas dealing with the mitigation of risk borne by cyber propaganda in the social media.  ...  His areas of expertise include strategy, risk and incident response in information security management (ISM).  ... 
doi:10.1109/access.2020.2994658 fatcat:cvmaygf7ffewfo76ofosye7quq

Business Process Modeling for Insider Threat Monitoring and Handling [chapter]

Vasilis Stavrou, Miltiadis Kandias, Georgios Karoulas, Dimitris Gritzalis
2014 Lecture Notes in Computer Science  
We examine existing security approaches to tackle down the aforementioned threat in enterprise business processes and propose a preliminary model for a monitoring approach that aims at mitigating the insider  ...  This approach enhances business process monitoring tools with information evaluated from Social Media by examining the online behavior of users and pinpoints potential insiders with critical roles in the  ...  To mitigate the insider threat, security research has proposed various approaches, countermeasures and techniques, together with security policies, procedures and technical controls.  ... 
doi:10.1007/978-3-319-09770-1_11 fatcat:fgm3345g4rewdhgpht2zvkga7m

A Human Dimension of Hacking: Social Engineering through Social Media

Heidi Wilcox, Maumita Bhattacharya
2020 IOP Conference Series: Materials Science and Engineering  
This paper identifies such regional variations and then presents a detailed investigation on information security outlooks and practices, surrounding social media, in Australian organisations (both public  ...  Social engineering through social media channels targeting organizational employees is emerging as one of the most challenging information security threats.  ...  Social Media & Information Security: Regional Perspectives This section presents an outline of social media and information security scenarios from various global regions, based on literature review.  ... 
doi:10.1088/1757-899x/790/1/012040 fatcat:wmvc4wmtybboxeiusupc3e5dfu

Have you been a victim of COVID-19-related Cyber incidents? Survey, taxonomy, and mitigation strategies

Saqib Hakak, Wazir Zada Khan, Muhammad Imran, Kim-Kwang Raymond Choo, Muhammad Shoaib
2020 IEEE Access  
COUNTERING INFODEMIC CAMPAIGNS To counter infodemic campaigns, we need the support and involvement of a broad range of stakeholders, such as social media platforms.  ...  media for panic and financial gains Identification and classification of fake or misleading news through human-in-loop machine learning techniques.  ...  He is the serving as a reviewer of many reputed journals and also a member of the technical program committee for many international conferences.  ... 
doi:10.1109/access.2020.3006172 fatcat:gytkijgmjzgy7ickubazve4g3a

A Big Data Reference Architecture for Emergency Management

Carlos A. Iglesias, Alfredo Favenza, Álvaro Carrera
2020 Information  
This paper aims to provide a reference architecture for emergency management that instantiates the NIST Big Data Reference Architecture to provide a common language and enable the comparison of solutions  ...  On the one hand, the availability of big data and the evolution of geographical information systems make it possible to manage and process large quantities of information that can hugely improve the decision-making  ...  [30] carried out an interdisciplinary review of social media use in disasters.  ... 
doi:10.3390/info11120569 fatcat:kxostcrulbh7lpnd3qehl7h2by

Developing Social Media Policy for Public Agencies in Egypt

Gehad Soliman Sayed Kenawy
2016 IAFOR Journal of the Social Sciences  
To achieve this purpose, the methodology adopted includes a review of the existing research on social media policies, analysis of current social media policies in different countries, and interviews with  ...  Being interested in the power of social media in public agencies, this paper suggests a social media policy that provides guidance on how public employees can efficiently and securely use official social  ...  reap the benefits of social media and mitigate their potential challenges and risks.  ... 
doi:10.22492/ijss.2.1.01 fatcat:myyveuzvrjgdbilgrneppfxv74

Major Security Issue That Facing Social Networks with Its Main Defense Strategies

Abdullah Safhi, Adel Al-Zahrani, Mohammed Alhibbi
2022 Tehnički glasnik  
Regardless of the economic and social benefits, protecting businesses and users' security and privacy remains a critical issue that must be addressed.  ...  The Social Network Service "SNS" has enabled significant advancements in a wide variety of scientific fields, and as a result, it has become an extremely popular subject in both academia and business.  ...  INTRODUCTION AND LITERATURE REVIEW A Social Network Service (SNS) has recently gained a lot of attention due to a variety of features.  ... 
doi:10.31803/tg-20220124140610 fatcat:yym42v4lbrdyheiuz5dib7ncpq

Social Media Usage in Health Communication and Its Implications on Public Health Security: A Case Study of COVID-19 in Zanzibar

Yiqun Geng, Rashid Maalim Khamis
2021 Online Journal of Communication and Media Technologies  
This qualitatively study used a sample of 30 communication experts and health professionals to explore the role of social media in mitigating COVID-19 infections and its implications to people's health  ...  Furthermore, Social media usage poses no threat to peoples' health during pandemic, however, there is high risk to affect those who lack Internet media literacy.  ...  METHODOLOGY This was a qualitative research intended to gain a comprehensive understanding about the uses of social media in mitigating COVID-19 infection and its implications to health security.  ... 
doi:10.30935/ojcmt/9575 fatcat:jtw7iwqgbra55hpml4csit3rse

Achieving It Governance Of Social Media At Strategic And Operational Levels

Petro Gerber
2016 International Business & Economics Research Journal  
that social media introduces to a business.  ...  Social media offers great opportunities for businesses, and the use thereof will increase competitiveness. However, social media also introduces significant risks to those who adopt it.  ...  to mitigate these risks. 3.2.3.3 Appoint a brand protection firm or employee who can scan and monitor social media sites for inappropriate communication or misuse. 3.2.3.4 Develop and implement a social  ... 
doi:10.19030/iber.v15i4.9753 fatcat:p2jtyws67nca7ok6a25bhtxyu4

Multimedia Privacy

Gerald Friedland, Symeon Papadopoulos, Julia Bernd, Yiannis Kompatsiaris
2016 Proceedings of the 2016 ACM on Multimedia Conference - MM '16  
This tutorial brings together a number of recent advances at the nexus of multimedia analysis, online privacy, and social media mining.  ...  Our goal is to offer a multidisciplinary view of the emerging field of Multimedia Privacy: the study of privacy issues arising in the context of multimedia sharing in online platforms, and the pursuit  ...  He has been the co-organizer of numerous international conferences and workshops and has served as a regular reviewer for a number of journals and conferences.  ... 
doi:10.1145/2964284.2986915 dblp:conf/mm/FriedlandPBK16 fatcat:eudgdlagpjdn5mqq46xfjbrph4

Supporting ethical migration research: Practical recommendations for funding bodies [article]

Kahina Le Louvier, Jamie Mahoney, Diotima Bertel, James Edwards
2022 Zenodo  
methods with social media analytics.  ...  This policy brief aims to provide funding bodies with practical tools to anticipate and mitigate the risks associated with international migration research projects that combine traditional social research  ...  by the processing of social media data and the associated risks to data privacy.  ... 
doi:10.5281/zenodo.6962722 fatcat:uerdfcs77ncnbklcs3fucarxkm

Recent Advances in Social Network Analysis, Management and Security

Yaser Jararweh, Mohammad Al-Smadi, Elhadj Benkhelifa
2020 Journal of universal computer science (Online)  
The purpose of this special issue was to provide a forum for researchers to present and discuss their work which is related to social network analysis, management and security.  ...  It aims to investigate the opportunities in all aspects of Social Networks Analysis, Management and Security. In addition, it seeks for novel contributions that help mitigating possible challenges.  ...  Juola discusses the technology, focusing on its application to social media in a variety of disciplines.  ... 
doi:10.3897/jucs.2020.001 fatcat:hvl6w64onnfbdntt2caoqxxzcq

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Tells a story about how a social engineering attack can be designed using data posted on social media.  ...  Describes methods for secure use of social media. Tells a story about dangerous places on the web and how surfing one of them can have a negative impact on privacy or security.  ... 
doi:10.5281/zenodo.4765646 fatcat:ok3zjkw2ive2tlrpl3btxqr6l4

Competency Pool and the competency model for cyber and information security professionals

Daniel Bendler
2021 Zenodo  
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented.  ...  Tells a story about how a social engineering attack can be designed using data posted on social media.  ...  Describes methods for secure use of social media. Tells a story about dangerous places on the web and how surfing one of them can have a negative impact on privacy or security.  ... 
doi:10.5281/zenodo.4765645 fatcat:ge7mwxfwpbfk3lifnyoc7aixzq
« Previous Showing results 1 — 15 out of 52,298 results