A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2016; you can also visit the original URL.
The file type is application/pdf
.
Filters
Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook
2017
IEEE Systems Journal
Using Facebook as a case study, we show that it is possible to detect such incidents by analyzing SNS users' browsing behavior. ...
With the growing popularity of Social Networking Services (SNSs), increasing amounts of sensitive information are stored online and linked to SNS accounts. ...
ACKNOWLEDGEMENTS This work was supported in part by the Ministry of Science and Technology, National Taiwan University, and Intel Corporation under Grants MOST 103-2911-I-002-001, NTU-ICRP-104R7501, and ...
doi:10.1109/jsyst.2015.2504102
fatcat:sgmnsctmnrdoxjulq72u3jyy4a
Detecting in-situ identity fraud on social network services
2014
Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion
In this paper, we propose to use a continuous authentication approach to detect the in-situ identity fraud incidents, which occur when the attackers use the same devices and IP addresses as the victims ...
Using Facebook as a case study, we show that it is possible to detect such incidents by analyzing SNS users' browsing behavior. ...
In-situ identity fraud is widespread for a number of reasons. ...
doi:10.1145/2567948.2577308
dblp:conf/www/WuCTLC14
fatcat:i5bsqo5wozezbjoza4g7m7mugy
Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks
2017
IEICE transactions on information and systems
In this paper, we develop a fraud analysis and detection system based on realtime messaging communications, which constitute one of the most common human-interacted services of online social networks. ...
Effectively detecting fraudulent activities on social networks has taken on increased importance, and is a topic of ongoing interest. ...
Acknowledgments This work was supported in part by the Academia Sinica, in part by the Taiwan ...
doi:10.1587/transinf.2016ini0003
fatcat:eblc3yuairenfoutdxtacziidi
Social Engineering Attacks on Facebook – A Case Study
2021
Zenodo
Originality/Value: This paper study gives a brief overview of Social Engineering Attacks on Facebook based on a variety [...] ...
Background/Purpose: Facebook is an American business that offer online social networking services. ...
Detecting in situ identity
fraud on social network services: A case study with facebook. IEEE Systems Journal, 11(4), 2432-
2443. ...
doi:10.5281/zenodo.5765883
fatcat:bs5qkpt6avcx3phvlgrxdojevi
Perspectives of Managing Mobile Service Security Risks
2015
International Journal of Distributed Sensor Networks
of inefficiencies generated by monopolies in wired networks. ...
and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy. ...
So in case of multiprovider environments (as a result of providing multimobile networking accessibility through collaboration strategy) managing such identity becomes an issue. ...
doi:10.1155/2015/592150
fatcat:iyuvy6b2xjb55jazhv7z7inswu
Online Social Deception and Its Countermeasures: A Survey
2020
IEEE Access
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ...
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks. ...
The advanced features of social network service technologies further facilitated the significant increase of serious, sophisticated cybercrimes, such as human trafficking, online consumer fraud, identity ...
doi:10.1109/access.2020.3047337
fatcat:xw2rr2sjnrdf3nk4vfuowrkizy
Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey
[article]
2020
arXiv
pre-print
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives. ...
As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks. ...
[140] studied 900 honey-profiles to detect spammers in three social network communities (e.g., MySpace, Facebook, and Twitter). They collected activity data for a long time (i.e., one year). ...
arXiv:2004.07678v1
fatcat:k4a6siywefb6lhkmyn67lmoqwe
International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]
2020
2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)
ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study. ...
ACKNOWLEDGMENT The authors would like to extend their heartfelt gratitude and acknowledgment to all the language experts, Sinhala teachers from different schools and especially, the Sinhala Department in ...
Social networks such as Twitter, Facebook, LinkedIn, and Instagram have acquired their user's attraction by maintaining their identity with very similar features. ...
doi:10.1109/scse49731.2020.9313027
fatcat:gjk5az2mprgvrpallwh6uhvlfi
A Systematic Review on Healthcare Analytics: Application and Theoretical Perspective of Data Mining
2018
Healthcare
However, analytics based on website and social media data has been increasing in recent years. ...
In this paper, we present a review of the literature on healthcare analytics using data mining and big data. ...
The case study made use of personal information provided in two Medicare social networking sites, MedHelp and Mp and Th1 to identify an individual. ...
doi:10.3390/healthcare6020054
pmid:29882866
pmcid:PMC6023432
fatcat:xkq4mkqbprabvipxnmcvk3hr6m
Message from the Program Chairs
2006
19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded Systems Design (VLSID'06)
We are pleased to note that the conference, through its underlying tracks with diverse track leadership, has received a very high number of submissions this year. ...
It has been an absolute pleasure to work with many academics, students and industry practitioners to develop a thought provoking program for the conference and to introduce some new initiatives, which ...
on Facebook can expose individuals to increased risk such as cybercrime and identity theft. ...
doi:10.1109/vlsid.2006.117
dblp:conf/vlsid/X06a
fatcat:4wsrdpwnu5bx5dah5ooyrhkjqi
Security Enhancement of IoT and Fog Computing Via Blockchain Applications
2021
Journal of Soft Computing and Data Mining
The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed networks. ...
Finally, we conduct a review of some recent literature on using blockchain applications to improve IoT and fog computing security and compare the methods proposed in the literature. ...
By combining our fog computing infrastructure with Blockchain-based social networks, users would be able to securely manage smart artifacts by providing tamper-proof digital identities in a trustless environment ...
doi:10.30880/jscdm.2021.02.02.003
fatcat:i24c772rdra7taafliel7uxbma
Mutual Shaping between Technologies and Law: Memories of Norwegian e-Health Infrastructures
2016
Zenodo
The dissertation also provides a computational systems approach, generated bottom up from qualitative data in application of the abstractions for their recursive improvement. ...
This approach consists of nine categories of conditional rules with an open ending for their replication to N number of datasets and enhanced learning from real-world decisions, professional practices ...
A case could be chosen that has a design work dataset in time overlap with the design work of the studied cases in this research. ...
doi:10.5281/zenodo.3474437
fatcat:p4nygtz7kfhqpa26lnyd7gmtua
Investigating And Prosecuting Cyber Crime: Forensic Dependencies And Barriers To Justice
2015
Zenodo
Further, a fictional case study is used as a vehicle to stimulate thinking and exemplify key points of reference. ...
tasked with working cyber crime cases. ...
, activity on social networking websites, data retained by service providers, etc.). ...
doi:10.5281/zenodo.22387
fatcat:xjbjc5hs7zcnxnrnlukkkenxi4
Please Enter Your Home Location: Geoprivacy Attitudes and Personal Location Masking Strategies of Internet Users
2019
Annals of the American Association of Geographers
Using a probability-based sample and an open online sample from California, this study finds that in situ personal masking behavior is consistent across demographic groups. ...
Location masking, or geomasking, is a practice typically undertaken by data stewards who wish to release a georeferenced data set without infringing on the privacy of those whose data are involved. ...
52 percent routinely interacted with location services controls, enabling location services in some cases and shutting them down in others. ...
doi:10.1080/24694452.2019.1654843
fatcat:xy7qnfcoabdtvpvapidaol47by
Understanding And Mapping Big Data
2015
Zenodo
BIG DATA DEFINITION IN CULTURE This section examines the meaning of big 'cultural' data, both in terms of reference to the BYTE project case study on big cultural data, and with a broader view that encompasses ...
Hughes, "Crisis Informatics: Studying Crisis in a Networked World", Third International Conference on e-Social Science, Ann Arbor, Michigan, October 7-9, 2007. 51 Ibid. 52 UN Global Pulse, Big Data for ...
doi:10.5281/zenodo.49161
fatcat:wz3cwet3wfbmvfzucivu3t64eq
« Previous
Showing results 1 — 15 out of 166 results