5,595 Hits in 10.4 sec

All our messages are belong to us

Marian Harbach, Sascha Fahl, Thomas Muders, Matthew Smith
2012 Proceedings of the 21st international conference companion on World Wide Web - WWW '12 Companion  
We present a fully-working prototype for Facebook and an initial usability study, showing that, on average, untrained users can be ready to use the service in three minutes.  ...  Current online social networking (OSN) sites pose severe risks to their users' privacy.  ...  Therefore, we propose a novel and above all user-friendly approach to add confidentiality and integrity to private messaging in social networks.  ... 
doi:10.1145/2187980.2188106 dblp:conf/www/HarbachFMS12 fatcat:tqqs47votzhzhaxnzkumiiseyu

Availability and use of technology for e-learning: to what extent do these impact Bangladeshi university students? A cross-sectional study

Md. Kamrul Hasan, Tajrin Tahrin Tonmon, Humayun Kabir, Sumaya Binte Masud, Md. Abeed Hasan, Bikash Das, Monira Akter, Mohammad Delwer Hossain Hawlader, Dipak Kumar Mitra
2021 F1000Research  
Thus, the study aimed to investigate technological availability, usability, and association to university students' perceived stress due to e-learning curriculum.  ...  The main explanatory variables were related to the availability of technology and the use of technology. The outcome variable was perceived e-learning stress.  ...  Acknowledgments We would like to accolade all the research assistants of the project who assisted in data collection.  ... 
doi:10.12688/f1000research.75532.1 fatcat:stjkusttnbfxzjg5qimjkprr5i

GDPR-Compliant Use of Blockchain for Secure Usage Logs [article]

Valentin Zieglmeier, Gabriel Loyola Daiqui
2021 arXiv   pre-print
After a rightful request, an individual's personal data need to be rectified or deleted, which is impossible in an immutable blockchain.  ...  To solve this issue, we exploit a legal property of pseudonymized data: They are only regarded personal data if they can be associated with an individual's identity.  ...  In theory, the nodes would not necessarily need to store their key pairs and used pseudonyms at all to reduce their attack surface. Yet, these are important to enable requirements (3), (4), and (6).  ... 
arXiv:2104.09971v1 fatcat:osfmxyu2vvfo7arhpc6fppgyye

Remote Health Monitoring Using Online Social Media

Chonlatee Khorakhun, Saleem N. Bhatti
2014 EAI Endorsed Transactions on Ubiquitous Environments  
Additionally, the use of a social media context allows existing social interactions within the healthcare regime to be modelled within a carer network, working in harmony with, and providing support for  ...  To address these challenges, we propose the use of an online social media platform (OSMP) as a key component of a near-future remote health monitoring system.  ...  In our study, a notification is used as a mechanism to send an alert as a direct short message to reach all members in an emulated emergency situation.  ... 
doi:10.4108/ue.1.3.e2 fatcat:omciu4ssirdepc5xkfxpzgklzu

Inferring social ties in academic networks using short-range wireless communications

Igor Bilogrevic, Kévin Huguenin, Murtuza Jadliwala, Florent Lopez, Jean-Pierre Hubaux, Philip Ginzboorg, Valtteri Niemi
2013 Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society - WPES '13  
WiFi base stations are increasingly deployed in both public spaces and private companies, and the increase in their density poses a significant threat to the privacy of connected users.  ...  In this paper, we experimentally show that such an eavesdropper is able to infer the type of social relationships between mobile users better than an internal attacker.  ...  We would like to thank Imad Aad for the fruitfull discussions, as well as Nokia for supporting this project.  ... 
doi:10.1145/2517840.2517842 dblp:conf/wpes/BilogrevicHJLHGN13 fatcat:2ewujaww6rhlron6vkflt5ebfi

Motivations for Using Information for Decision making in Virtual Communities The Moderating Effects of Usage Behavior

Li-Ting Huang, Cheng-Kiang Farn, Hann-Tarn Jeng
2012 Pacific Asia Journal of the Association for Information Systems  
"Information browsers" mostly browse through information, rarely post messages, and consider relational and social factors as the main contributors to using information for decision making.  ...  We also explored the comparative importance of motivating factors behind members' intentions to use information for purchase-related decision making in different groups from three perspectives: the social  ...  However, social factors (a sense of belonging) remain important in all groups.  ... 
doi:10.17705/1pais.04101 fatcat:wliqaydr3zge3i7yopdm5o2hle

Remote health monitoring using online social media systems

C. Khorakhun, S. N. Bhatti
2013 6th Joint IFIP Wireless and Mobile Networking Conference (WMNC)  
Four different access viewpoints are implemented to suit the requirements of each user in our example scenario to form a carer network: the patient, the doctor in charge, professional carers, and family  ...  We examine the use of online social networks for remote health monitoring. By exploiting the existing infrastructure, initial costs can be reduced and fast application development is possible.  ...  Contribution In this paper, our contributions are to assess the suitability of the use of online social networks to form a carer network for remote health monitoring with respect to: • Viewpoints.  ... 
doi:10.1109/wmnc.2013.6548953 dblp:conf/mwcn/KhorakhunB13 fatcat:bz5sni7dunf27fvkpgnkfkf72a

Supporting Multi-agent Coordination and Computational Collective Intelligence in Enterprise 2.0 Platform

Seddik Reguieg, Noria Taghezout
2017 International Journal of Interactive Multimedia and Artificial Intelligence  
In this paper, we propose a novel approach utilizing a professional Social network (Pro Social Network) and a new coordination protocol (CordiNet).  ...  In fact, each enterprise is represented by a container of agents to ensure a secured and confidential information exchange between intra employers, and a central main container to connect all enterprises  ...  They are called when specific messages are received or are to be sent and must be treated in order to adapt the protocol to its context of use.  ... 
doi:10.9781/ijimai.2017.07.001 fatcat:kbdcznshdncdjpm3cdp6k3g7iq

Effective Health Promotion Interventions for Targeted Audience using Social Networking Sites: A Systematic Review

S. P. Meenakshi, P. Sivakumar, P. Ilango
2017 Indian Journal of Science and Technology  
Applications/Improvements: To build healthcare educated online communities in the social media, auto message feature and auto feedback system can help to increase the audience interaction.  ...  There are eight items used including response efficacy and behaviour efficacy to report about the target audience on social media for health campaigns.  ...  In social media, varieties of topics are blogged and messaged by the users at different times and from different places. The associated content size varies depending on the category it belongs.  ... 
doi:10.17485/ijst/2017/v10i36/86994 fatcat:sejy6cc6d5egnacgw7b3vnmjaq

A Novel Passwordless Authentication Scheme For Smart Phones Using Elliptic Curve Cryptography

Dr. Sheetal Kalra
2016 Zenodo  
accounts, social networking accounts and various other blogs.  ...  To date, password based authentication schemes have been extensively used to provide authentication and security.  ...  login to their bank accounts, social networking accounts and various other blogs.  ... 
doi:10.5281/zenodo.1164021 fatcat:ak7fue23grbrxhf4jaw3pxnpo4

Phishing Attacks and Counter Measures

Sophia Kingsley Okore, Benisemeni Zakka
2015 International Journal of Computer Trends and Technology  
Counterfeit web sites, using "hijacked" company brands and logos are created to lure individuals into revealing information that are confidential.  ...  Phishing is a term used to describe various scams that use fraudulent e-mail messages, sent by criminals, to trick people into exposing personal information.  ...  By leveraging the social connections in a network like Facebook or Twitter, phishers could send messages to a site's users that seem to be sent by a friend, and suggest visiting a page infected with bank  ... 
doi:10.14445/22312803/ijctt-v25p104 fatcat:otxta5acinditfpo2vszltukr4

Towards Enhanced Usability of IT Security Mechanisms - How to Design Usable IT Security Mechanisms Using the Example of Email Encryption [article]

Hans-Joachim Hof
2015 arXiv   pre-print
Nowadays, advanced security mechanisms exist to protect data, systems, and networks.  ...  Today, the average end user often struggles with understanding and using security mecha-nisms. Other security mechanisms are simply annoying for end users.  ...  G4 Efficient use of user attention and memorization capability: Users have problems memorizing data that does not belong to their social background.  ... 
arXiv:1506.06987v1 fatcat:q2nk6mdvjfaf7eapxftaspykua

Directing Status Messages to Their Audience in Online Communities [chapter]

Milan Stankovic, Alexandre Passant, Philippe Laublet
2010 Lecture Notes in Computer Science  
In this paper we present the results of our user study about status message sharing on the Social Web.  ...  We propose a way to use semantic descriptions of status messages, their intended audiences and distributed data about users to direct status messages to their intended recipients.  ...  Firstly, confidentiality of status messages in open communities is a significant question, since not all status messages are meant for general public.  ... 
doi:10.1007/978-3-642-14962-7_13 fatcat:2u2f72yepnd6vo5b6g6bftjdq4

Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey

Pardeep Kumar, Hoon-Jae Lee
2011 Sensors  
Healthcare applications are considered as promising fields for wireless sensor networks, where patients can be monitored using wireless medical sensor networks (WMSNs).  ...  We highlight some popular healthcare projects using wireless medical sensor networks, and discuss their security.  ...  We are very thankful to anonymous reviewers for their comments and suggestions for making this valuable survey, which helps to the future researchers.  ... 
doi:10.3390/s120100055 pmid:22368458 pmcid:PMC3279202 fatcat:yfaq2ilem5cm7mpacaafsjgwga

Technology Adoption and Use in the Aftermath of Hurricane Katrina in New Orleans

Irina Shklovski, Moira Burke, Sara Kiesler, Robert Kraut
2010 American Behavioral Scientist  
The authors found that in the immediate aftermath, musicians used cell phones and the Internet to locate family and friends and obtain information unavailable in broadcast news reports.  ...  Those who remained away found that digital connections to the New Orleans community were insufficient to maintain a sense of belonging.  ...  Acknowledgments We are indebted to all of our respondents for their generous participation in our study in a time of crisis.  ... 
doi:10.1177/0002764209356252 fatcat:kjytosqctfep3icx7ktdynzvvu
« Previous Showing results 1 — 15 out of 5,595 results