730 Hits in 10.8 sec

Spamming for Science: Active Measurement in Web 2.0 Abuse Research [chapter]

Andrew G. West, Pedram Hayati, Vidyasagar Potdar, Insup Lee
2012 Lecture Notes in Computer Science  
Spam and other electronic abuses have long been a focus of computer security research.  ...  Spam and other electronic abuses have long been a focus of computer security research.  ...  In particular, Robert R. Terrell of UPenn's Office of the General Counsel is thanked for his guidance.  ... 
doi:10.1007/978-3-642-34638-5_9 fatcat:ikgjg6jzvngf3keuxbovehccf4

Armed for the Spam Battle: A Technological and Organizational Infrastructure Framework

Guido Schryen
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Many technological, organizational, and legislative anti-spam measures have already been proposed and implemented, but have not led to any substantial decrease in the number of spam e-mails.  ...  We propose here a new infrastructure framework that combines several anti-spam measures in a framework that features both a technological and an organizational facet.  ...  Process P1: setting up a CMAA record P1 is illustrated in Fig. 4 , which models the process with a UML 2.0 activity diagram.  ... 
doi:10.1109/hicss.2007.86 dblp:conf/hicss/Schryen07 fatcat:qwdzjvuu2zfb5dylervrcwvkoa

Marketing Privacy: A Solution for the Blight of Telemarketing (and Spam and Junk Mail)

Ian Ayres, Matthew Funk
2002 Social Science Research Network  
, benefits some telemarketers and falls short for other telemarketers in proportion to the social inefficiency of their activity.  ...  regulating actiVitIes which may result In economIc harm.") 161 Frisby v.  ...  There are parallel benefits to creating market-based regimes that allow recipients to "name the price" that they wish to be paid for receiving pieces of direct mail or spam.  ... 
doi:10.2139/ssrn.303303 fatcat:joee4rgsxvhlrbrwj7g5p4or6m

Spam 2.0: The Problem Ahead [chapter]

Vidyasagar Potdar, Farida Ridzuan, Pedram Hayati, Alex Talevski, Elham Afsari Yeganeh, Nazanin Firuzeh, Saeed Sarencheh
2010 Lecture Notes in Computer Science  
The development of web applications where users can contribute content has also increased spam, since many web applications like blogging tools, CMS etc are vulnerable to spam.  ...  We aim to increase the general understanding of the webspam problem which will assist web developers, software engineers and web engineers.  ...  Vulnerable Web Applications Many web applications are vulnerable to spam because these applications did not consider any anti-spam measures when they were built.  ... 
doi:10.1007/978-3-642-12165-4_32 fatcat:u5mwncfme5eerajwyfxs6kt75q

Online Child Sex Solicitation: Exploring the Feasibility of a Research 'Sting'

Roderic Broadhurst, Kasun Jayawardene
2008 Social Science Research Network  
A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007.  ...  The need for further research and better means of regulating such sites was suggested.  ...  The term Web 2.0 denotes a progression in the use and capabilities of the Internet.  ... 
doi:10.2139/ssrn.2137390 fatcat:n7zhubv73ja7hdkoeocrgigtii

Detecting Comment Spam through Content Analysis [chapter]

Congrui Huang, Qiancheng Jiang, Yan Zhang
2010 Lecture Notes in Computer Science  
In the Web 2.0 eras, the individual Internet users can also act as information providers, releasing information or making comments conveniently.  ...  However, some participants may spread irresponsible remarks or express irrelevant comments for commercial interests. This kind of socalled comment spam severely hurts the information quality.  ...  Social network service provides a platform for people to share their interests, or to dig topics and activities they concerned.  ... 
doi:10.1007/978-3-642-16720-1_23 fatcat:fzjpuja5afecjgwyw2dvos5zbi

Spam 2.0 State of the Art

Pedram Hayati, Vidyasagar Potdar
2012 International Journal of Digital Crime and Forensics  
Spam 2.0 is defined as the propagation of unsolicited, anonymous, mass content to infiltrate legitimate Web 2.0 applications.  ...  A fake eye-catching profile in social networking websites, a promotional review, a response to a thread in online forums with unsolicited content, or a manipulated Wiki page are examples of Spam 2.0.  ...  Spam 2.0 in web discussion forums.  ... 
doi:10.4018/jdcf.2012010102 fatcat:244v55izczeazidra3ayzqt2le

Internet filters in Canadian libraries

Kate Schulz
2020 Pathfinder: A Canadian Journal for Information Science Students and Early Career Professionals  
This paper will investigate and discuss the function of and methodology behind internet filters, with specific attention to their application in Canada.  ...  Following a general overview, a discussion follows of what library professionals in public and school libraries should do to uphold and protect intellectual freedom.  ...  Web 2.0 is "the stage of the Web that allows users to connect through interactive technology [(i.e., social media websites)]" (Mazzei, 2019 , Definition of Web 2.0 section, para. 1).  ... 
doi:10.29173/pathfinder23 fatcat:igxibtcuunc3nhy3sl2rurrxyq

Characterizing Long-tail SEO Spam on Cloud Web Hosting Services

Xiaojing Liao, Chang Liu, Damon McCoy, Elaine Shi, Shuang Hao, Raheem Beyah
2016 Proceedings of the 25th International Conference on World Wide Web - WWW '16  
The emergence of cloud web hosting services provides a new and effective platform for longtail SEO spam attacks.  ...  After identifying 3,186 cloud directories and 318,470 doorway pages on the leading cloud platforms for long-tail SEO spam, we characterize their abusive behavior.  ...  In our research, we consider the abusive users who try to use cloud web hosting service for longtail SEO spam.  ... 
doi:10.1145/2872427.2883008 dblp:conf/www/LiaoLMSHB16 fatcat:ypcf7xuwi5fjnpeeerlb4zqcqy

The history of digital spam

Emilio Ferrara
2019 Communications of the ACM  
In this article, I will briefly review the history of digital spam: starting from its quintessential incarnation, spam emails, to modern-days forms of spam affecting the Web and social media, the survey  ...  will close by depicting future risks associated with spam and abuse of new technologies, including Artificial Intelligence (e.g., Digital Humans).  ...  ACKNOWLEDGMENTS The author would like to thank current and former members of the USC Information Sciences Institute's MINDS research group, as well as of the Indiana University's CNetS group, for invaluable  ... 
doi:10.1145/3299768 fatcat:ht45pgouvfhjnaka2uxqv4nahm

Pollution, bad-mouthing, and local marketing: The underground of location-based social networks

Helen Costa, Luiz H.C. Merschmann, Fabrício Barth, Fabrício Benevenuto
2014 Information Sciences  
Location Based Social Networks (LBSNs) are new Web 2.0 systems that are attracting new users in exponential rates.  ...  In this paper, we investigated the task of identifying different types of tip spam on a popular Brazilian LBSN system, namely Apontador.  ...  Acknowledgements This research is partially funded by the Brazilian National Institute of Science and Technology for the Web (MCT/CNPq/ INCT Grant No. 573871/2008-6), and by the authors' individual grants  ... 
doi:10.1016/j.ins.2014.03.108 fatcat:p36e3yyh3nav5corxje5xfzjcq

An Information Systems Design Theory for Collaborative ePortfolio Systems

Xuesong Zhang, L Olfman, D Firpo
2011 2011 44th Hawaii International Conference on System Sciences  
The research model is discussed and the evaluation is planned to examine users' perceived value of the new system, measured by usefulness as a tool, effectiveness in achieving users ' goals, knowledge,  ...  This paper proposes Information Systems Design Theory for ePortfolio systems following the methodology by Walls et al. (1992) . A new ePortfolio system is designed based on the proposed ISDT.  ...  KEEP SLS enforces login-restricted commenting for anti-spam and anti-abuse reasons. And the registration requires a visual confirmation to prevent bots from auto signing up and spamming web sites.  ... 
doi:10.1109/hicss.2011.56 dblp:conf/hicss/ZhangOF11 fatcat:awrk6bkzzrgqvo4y2jx556saty

How Unique and Traceable Are Usernames? [chapter]

Daniele Perito, Claude Castelluccia, Mohamed Ali Kaafar, Pere Manils
2011 Lecture Notes in Computer Science  
Usernames are ubiquitously used for identification and authentication purposes on web services and the Internet at large, ranging from the local-part of email addresses to identifiers in social networks  ...  In collecting the data needed for our study, we also show that users tend to choose a small number of related usernames and use them across many services.  ...  We would also like to thank the reviewers for their insightful comments.  ... 
doi:10.1007/978-3-642-22263-4_1 fatcat:mopx3t535jaw3ca22iukq3nila


Marin Carmen, Vechiu Camelia, Enache Elena, Morozan Gigi-Cristian
2010 Annals of the University of Oradea: Economic Science  
Socialization online sites have become important landmarks for people all around the world and of all ages, especially for youth.  ...  In some cases, people who meet on such sites decide to meet also in the real life.  ...  With the adoption of more widescale video and Web 2.0 technologies, companies are becoming increasingly interested in using video communications for the expansion of commercial activities, attracting more  ... 
doaj:9596f0986eca4f4ebf42a1930e81b993 fatcat:54jbjvarnvaiti4h6k3f4snl34

The [R]evolution of Open Science

Jonathan Tennant
2020 Zenodo  
Open Science is a paradigm shift in how global research systems produce and communicate knowledge.  ...  And now the whole book is available online for free here. All funds raised from the sale of this book will be invested in furthering the mission of creating a healthier global research culture.  ...  How can the power and practices of the web, particularly the social aspects of Web 2.0, be leveraged to think about innovative models for peer review?  ... 
doi:10.5281/zenodo.3700645 fatcat:kfoyv4cup5gc3oegmoajs77jxe
« Previous Showing results 1 — 15 out of 730 results