Filters








166 Hits in 10.2 sec

Detecting In Situ Identity Fraud on Social Network Services: A Case Study With Facebook

Shan-Hung Wu, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen
2017 IEEE Systems Journal  
Using Facebook as a case study, we show that it is possible to detect such incidents by analyzing SNS users' browsing behavior.  ...  In this paper, we propose to extend to use of continuous authentication to detect the in-situ identity fraud incidents, which occurs when the attackers use the same accounts, the same devices and IP addresses  ...  ACKNOWLEDGEMENTS This work was supported in part by the Ministry of Science and Technology, National Taiwan University, and Intel Corporation under Grants MOST 103-2911-I-002-001, NTU-ICRP-104R7501, and  ... 
doi:10.1109/jsyst.2015.2504102 fatcat:sgmnsctmnrdoxjulq72u3jyy4a

Detecting in-situ identity fraud on social network services

Shan-Hung Wu, Man-Ju Chou, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen
2014 Proceedings of the 23rd International Conference on World Wide Web - WWW '14 Companion  
In this paper, we propose to use a continuous authentication approach to detect the in-situ identity fraud incidents, which occur when the attackers use the same devices and IP addresses as the victims  ...  Using Facebook as a case study, we show that it is possible to detect such incidents by analyzing SNS users' browsing behavior.  ...  In-situ identity fraud is widespread for a number of reasons.  ... 
doi:10.1145/2567948.2577308 dblp:conf/www/WuCTLC14 fatcat:i5bsqo5wozezbjoza4g7m7mugy

Social Engineering Attacks on Facebook – A Case Study

Abdul Shareef Pallivalappil, N. Jagadeesha S., K. Krishna Prasad
2021 Zenodo  
Originality/Value: This paper study gives a brief overview of Social Engineering Attacks on Facebook based on a variety [...]  ...  Background/Purpose: Facebook is an American business that offer online social networking services.  ...  Detecting in situ identity fraud on social network services: A case study with facebook. IEEE Systems Journal, 11(4), 2432- 2443.  ... 
doi:10.5281/zenodo.5765883 fatcat:bs5qkpt6avcx3phvlgrxdojevi

Fraud Analysis and Detection for Real-Time Messaging Communications on Social Networks

Liang-Chun CHEN, Chien-Lung HSU, Nai-Wei LO, Kuo-Hui YEH, Ping-Hsien LIN
2017 IEICE transactions on information and systems  
In this paper, we develop a fraud analysis and detection system based on realtime messaging communications, which constitute one of the most common human-interacted services of online social networks.  ...  Effectively detecting fraudulent activities on social networks has taken on increased importance, and is a topic of ongoing interest.  ...  Acknowledgments This work was supported in part by the Academia Sinica, in part by the Taiwan  ... 
doi:10.1587/transinf.2016ini0003 fatcat:eblc3yuairenfoutdxtacziidi

Perspectives of Managing Mobile Service Security Risks

Mohammed Ahmed Truki AlSudiary
2015 International Journal of Distributed Sensor Networks  
of inefficiencies generated by monopolies in wired networks.  ...  and management perspectives on the security issues, and (iii) to present them through a methodology oriented taxonomy.  ...  So in case of multiprovider environments (as a result of providing multimobile networking accessibility through collaboration strategy) managing such identity becomes an issue.  ... 
doi:10.1155/2015/592150 fatcat:iyuvy6b2xjb55jazhv7z7inswu

Online Social Deception and Its Countermeasures: A Survey

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 IEEE Access  
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  The advanced features of social network service technologies further facilitated the significant increase of serious, sophisticated cybercrimes, such as human trafficking, online consumer fraud, identity  ... 
doi:10.1109/access.2020.3047337 fatcat:xw2rr2sjnrdf3nk4vfuowrkizy

Online Social Deception and Its Countermeasures for Trustworthy Cyberspace: A Survey [article]

Zhen Guo, Jin-Hee Cho, Ing-Ray Chen, Srijan Sengupta, Michin Hong, Tanushree Mitra
2020 arXiv   pre-print
We are living in an era when online communication over social network services (SNSs) have become an indispensable part of people's everyday lives.  ...  As a consequence, online social deception (OSD) in SNSs has emerged as a serious threat in cyberspace, particularly for users vulnerable to such cyberattacks.  ...  [140] studied 900 honey-profiles to detect spammers in three social network communities (e.g., MySpace, Facebook, and Twitter). They collected activity data for a long time (i.e., one year).  ... 
arXiv:2004.07678v1 fatcat:k4a6siywefb6lhkmyn67lmoqwe

International Research Conference on Smart Computing and Systems Engineering SCSE 2020 Proceedings [Full Conference Proceedings]

2020 2020 International Research Conference on Smart Computing and Systems Engineering (SCSE)  
ACKNOWLEDGMENT The authors would like to thank the Department of Census and Department of Irrigation, Sri Lanka for providing the paddy yield and climate data for this study.  ...  ACKNOWLEDGMENT The authors would like to extend their heartfelt gratitude and acknowledgment to all the language experts, Sinhala teachers from different schools and especially, the Sinhala Department in  ...  Social networks such as Twitter, Facebook, LinkedIn, and Instagram have acquired their user's attraction by maintaining their identity with very similar features.  ... 
doi:10.1109/scse49731.2020.9313027 fatcat:gjk5az2mprgvrpallwh6uhvlfi

A Systematic Review on Healthcare Analytics: Application and Theoretical Perspective of Data Mining

Md Islam, Md Hasan, Xiaoyi Wang, Hayley Germack, Md Noor-E-Alam
2018 Healthcare  
However, analytics based on website and social media data has been increasing in recent years.  ...  In this paper, we present a review of the literature on healthcare analytics using data mining and big data.  ...  The case study made use of personal information provided in two Medicare social networking sites, MedHelp and Mp and Th1 to identify an individual.  ... 
doi:10.3390/healthcare6020054 pmid:29882866 pmcid:PMC6023432 fatcat:xkq4mkqbprabvipxnmcvk3hr6m

Message from the Program Chairs

2006 19th International Conference on VLSI Design held jointly with 5th International Conference on Embedded Systems Design (VLSID'06)  
All papers, including research-in-progress papers, underwent a rigorous double-blind review process.  ...  We would like to welcome you to the 28th Australasian Conference on Information Systems -ACIS2017.  ...  on Facebook can expose individuals to increased risk such as cybercrime and identity theft.  ... 
doi:10.1109/vlsid.2006.117 dblp:conf/vlsid/X06a fatcat:4wsrdpwnu5bx5dah5ooyrhkjqi

Security Enhancement of IoT and Fog Computing Via Blockchain Applications

Ramadan T. H. Hasan, IT Department, Technical College of Informatics Akre, Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ, Siddeeq Y. Ameen, IT Department, Technical College of Informatics Akre, Duhok Polytechnic University, Duhok, Kurdistan Region, IRAQ
2021 Journal of Soft Computing and Data Mining  
The development of IoT and Fog Computing technologies in different fields has resulted in a major improvement in distributed networks.  ...  Finally, we conduct a review of some recent literature on using blockchain applications to improve IoT and fog computing security and compare the methods proposed in the literature.  ...  While more investigation will help solve this current shortcoming, further study is needed until in situ power is recommended [11] .  ... 
doi:10.30880/jscdm.2021.02.02.003 fatcat:i24c772rdra7taafliel7uxbma

Mutual Shaping between Technologies and Law: Memories of Norwegian e-Health Infrastructures

Anna Zaytseva, Margunn Aanestad, Sundeep Sahay, Sisse Finken
2016 Zenodo  
The dissertation also provides a computational systems approach, generated bottom up from qualitative data in application of the abstractions for their recursive improvement.  ...  The logic of computation, as designed in this research, may potentially be applied for exploration of other qualitatively diverse, but overlapping spheres of life in their co-evolution, because the rules  ...  A case could be chosen that has a design work dataset in time overlap with the design work of the studied cases in this research.  ... 
doi:10.5281/zenodo.3474437 fatcat:p4nygtz7kfhqpa26lnyd7gmtua

Investigating And Prosecuting Cyber Crime: Forensic Dependencies And Barriers To Justice

Cameron S. D. Brown
2015 Zenodo  
Further, a fictional case study is used as a vehicle to stimulate thinking and exemplify key points of reference.  ...  Research in this paper has been guided by the firsthand global accounts (via the author's core involvement in the preparation of the Comprehensive Study on Cyber crime (United Nations Office on Drugs and  ...  , activity on social networking websites, data retained by service providers, etc.).  ... 
doi:10.5281/zenodo.22387 fatcat:xjbjc5hs7zcnxnrnlukkkenxi4

Please Enter Your Home Location: Geoprivacy Attitudes and Personal Location Masking Strategies of Internet Users

Dara E. Seidl, Piotr Jankowski, Keith C. Clarke, Atsushi Nara
2019 Annals of the American Association of Geographers  
Using a probability-based sample and an open online sample from California, this study finds that in situ personal masking behavior is consistent across demographic groups.  ...  Location masking, or geomasking, is a practice typically undertaken by data stewards who wish to release a georeferenced data set without infringing on the privacy of those whose data are involved.  ...  52 percent routinely interacted with location services controls, enabling location services in some cases and shutting them down in others.  ... 
doi:10.1080/24694452.2019.1654843 fatcat:xy7qnfcoabdtvpvapidaol47by

Understanding And Mapping Big Data

Rajendra Akerkar, Guillermo Vega-Gorgojo, Grunde Løvoll, Stephane Grumbach, Aurelien Faravelon, Rachel Finn, Kush Wadhwa, Anna Donovan, Lorenzo Bigagli
2015 Zenodo  
Hughes, "Crisis Informatics: Studying Crisis in a Networked World", Third International Conference on e-Social Science, Ann Arbor, Michigan, October 7-9, 2007. 51 Ibid. 52 UN Global Pulse, Big Data for  ...  Big data analytics can help tax agencies precisely determine who should be investigated for fraud or denied refunds by detecting new deception tactics, uncovering multiple identities and identifying suspicious  ... 
doi:10.5281/zenodo.49161 fatcat:wz3cwet3wfbmvfzucivu3t64eq
« Previous Showing results 1 — 15 out of 166 results