A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Sharing-Habits Based Privacy Control in Social Networks
[chapter]
2016
Lecture Notes in Computer Science
We study users behavior in online social networks (OSN) as a means to preserve privacy. People widely use OSN for a variety of objectives and fields. ...
We use several different well-known strategies from graph flows, and the sharing-habits of information flow among OSN users to define efficient and easy to implement algorithms for ensuring privacy preservation ...
We review some methods for handling and preserving privacy in social networks, and present our new privacy preserving approach, based on sharing-habits data. ...
doi:10.1007/978-3-319-41483-6_16
fatcat:urbb2piepffvfgxkjb4x7z7qnm
Research On Privacy Protection Strategies Of Mobile Social Network Users
2020
International journal of advanced networking and applications
It also briefly introduces the development trend and future research of access control policies in mobile social network. ...
in mobile social networks, and proposes the privacy protection strategies for users in mobile social networks from the aspects of formulating national laws and regulations, building and managing mobile ...
This work was supported by the National Social Science Foundation Project of China under Grant 16BTQ085. ...
doi:10.35444/ijana.2020.12103
fatcat:4bhf2mgnc5hanaiiectqek44my
Privacy in Social Networks: Existing Challenges and Proposals for Solutions
[chapter]
2015
Communications in Computer and Information Science
The significant change in our social lives and communication habits caused by the rise of Social Network Sites (SNSs) has not only brought along benefits but is also accompanied by privacy threats. ...
Motivation Since their emergence more than a decade ago, Social Network Sites (SNSs) are increasingly changing our social lives and communication habits. ...
of social network data types. ...
doi:10.1007/978-3-319-27668-7_2
fatcat:kbrd3cjv4bdqlcdudopmwmf3li
WHATS IN YOUR PROFILE? MAPPING FACEBOOK PROFILE DATA TO PERSONAL SECURITY QUESTIONS
2012
Issues in Information Systems
information-sharing in Facebook. ...
This study investigates data privacy concerns regarding the use of Facebook and university students' awareness of privacy control mechanisms, privacy best practices, and possible consequences of unprotected ...
Privacy controls in Facebook allow you to restrict access to profile data and content shared within the network. ...
doi:10.48009/1_iis_2012_284-293
fatcat:kswjisrq6vcpphsqrqflm6qf2e
Networked Privacy
2012
Surveillance & Society
Privacy construct portraits of individuals that predict their interests based on others' habits. ...
If we cannot rely on control to achieve privacy in a networked age, how then can we think about networked privacy? ...
doi:10.24908/ss.v10i3/4.4529
fatcat:yyo4rq67wncy7jfn23nekxwx2e
Management and Psychological Aspect: Teenagers' Awareness of Privacy in Social Media
2020
Jurnal Komunikasi Ikatan Sarjana Komunikasi Indonesia
Teenagers' awareness of online privacy was the focus of this study on account of frequent sharing of private information in social media. ...
A call for increased media literacy and the development of cyber law that can anticipate internet-based crime especially against teenagers, were discussed. ...
We thank all of our colleagues who provided support and valuable insight in completing this article.
References Alemany, J., Delval, E., & Garcia-Fornes, A. (2020 ...
doi:10.25008/jkiski.v5i2.429
fatcat:2o7dndrs2fcx7lbc7odrmzu4vu
Privacy and Social Networking Technology
2011
The International Review of Information Ethics
This paper reviews Facebook's controversial privacy policies as a basis for considering how social network sites can better protect the personal information of their users. ...
This architecture must be modified and Facebook must be more proactive in safeguarding the rights of their customers as it seeks to find the proper balance between user privacy and its commercial interests ...
The privacy conundrum of social networking can largely be resolved by architecture, by giving users simple, high-level controls to determine how much information they want to share. ...
doi:10.29173/irie201
fatcat:kd3txezygnhjjm46hnuccyr6qy
Users' Willingness to Share Data on the Internet: Perceived Benefits and Caveats
2016
Proceedings of the International Conference on Internet of Things and Big Data
In a two step empirical approach, we first explore users' perceptions of privacy in the context of Internet usage and social network sites by means of a focus group approach. ...
The aim of the current study was to analyze Internet usage behaviors and users' willingness to share their data when using digital services and social network sites. ...
of social network sites. ...
doi:10.5220/0005897402550265
dblp:conf/iotbd/ZiefleHK16
fatcat:6yzthkk6q5fbfb25dxziqs4l4y
Survey on Privacy Policy Specification System for User Uploaded Images Over Popular Content Sharing Sites
2017
International Journal for Research in Applied Science and Engineering Technology
In light of these incidents, the need of tools to aid users control access to their shared content is necessary. ...
This information needs to remain private and each social network owns a privacy policy that describes in-depth how user's information is managed and published. ...
Many users experience a perceived loss of control over their personal information and content when using online social networking services [11] . ...
doi:10.22214/ijraset.2017.2070
fatcat:a3uhplpq4jbftkx34x4f5ds3ca
Privacy-aware electronic society
2013
Annales des télécommunications
The paper "PriMa: A Comprehensive Approach to Privacy Protection in Social Network Sites" by Anna Squicciarini, Federica Paci, and Smitha Sundareswaran, proposes a privacy protection mechanism for social ...
The paper "Improving the User Content Privacy on Social Networks Using Rights Management Systems," by Joaquim Marques and Carlos Serrao, aims at protecting users' privacy in SNs. ...
doi:10.1007/s12243-013-0405-4
fatcat:tozimbin4ng3vjk5egfnve5khy
Four billion little brothers?
2009
Communications of the ACM
This article examines three applications from UCLA's CENS (Center for Embedded Networked Sensing) to illustrate the diversity of possibilities, as well as suggest data collection and sharing concerns. ...
slipping into coercion, surveillance, and control. ...
This article is based upon work supported by the National Science Foundation under Grant No. 0832873. ...
doi:10.1145/1592761.1592778
fatcat:annwjtkxw5dcdjzv56rx3n26ha
Four Billion Little Brothers?
2009
Queue
This article examines three applications from UCLA's CENS (Center for Embedded Networked Sensing) to illustrate the diversity of possibilities, as well as suggest data collection and sharing concerns. ...
slipping into coercion, surveillance, and control. ...
This article is based upon work supported by the National Science Foundation under Grant No. 0832873. ...
doi:10.1145/1594204.1597790
fatcat:v4bj7jo3ofhi3ehzrfwuabngae
Privacy in Online Social Networks
[chapter]
2013
Lecture Notes in Social Networks
In this context, we address privacy-related issues by resorting to social network analysis and link mining techniques. ...
The chapter concludes with a discussion of some open challenges to address in future privacy-related works. What is a Social Network? ...
-Relationship-based access control [73] [95] [96] : the approaches in this category are designed to enforce users' privacy and enable users to tune their privacy settings by controlling access based ...
doi:10.1007/978-3-7091-0894-9_1
dblp:series/lnsn/RaadC13
fatcat:pxzg2pz5onfppljbhfzs6cg76e
MobiShare: Flexible privacy-preserving location sharing in mobile online social networks
2012
2012 Proceedings IEEE INFOCOM
Location sharing is a fundamental component of mobile online social networks (mOSNs), which also raises significant privacy concerns. ...
MobiShare is flexible to support a variety of location-based applications, in that it enables location sharing between both trusted social relations and untrusted strangers, and it supports range query ...
This project was supported in part by US National Science Foundation grants CNS-1117412 and CAREER Award CNS-0747108. ...
doi:10.1109/infcom.2012.6195664
dblp:conf/infocom/WeiXL12
fatcat:i44kfdtyezaybh5hvgqlzfp5oq
Data Security – Challenges and Research Opportunities
[chapter]
2014
Lecture Notes in Computer Science
In this paper we briefly discuss open issues, such as data protection from insider threat and how to reconcile security and privacy, and outline research directions. ...
The proliferation of web-based applications and information systems, and recent trends such as cloud computing and outsourced data management, have increased the exposure of data and made security more ...
The research reported in this paper has been partially supported by NSF under awards CNS-1111512, CNS-1016722, CNS-0964294. ...
doi:10.1007/978-3-319-06811-4_2
fatcat:alb6rnpz6zgaroa3an63bpt2dy
« Previous
Showing results 1 — 15 out of 32,972 results