Search results for "Online identity"

showing 4 items of 4 documents

Towards better privacy preservation by detecting personal events in photos shared within online social networks

2015

Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…

CybersecurityDétection d’évènements[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Cyber SecurityEvent relationsData analysisRéseaux sociauxAnonymization[INFO] Computer Science [cs]Regroupement d’imagesRelations entre les évènementsCyber sécuritéPrivacy protection[INFO]Computer Science [cs]Protection de la vie privéeOnline social networksDétection d'évènementsMetadataAnonymisationIdentité numériqueAnalyse de donnéesOnline identityImage clustering[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]MétadonnéesSocial Networks[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Event detection
researchProduct

Communication students' motives for and attitudes towards personal branding

2015

Henkilöbrändäys ja profiloituminen ovat olleet pitkään eri alojen kuuluisuuksien etuoikeus. Sosiaalinen media on kuitenkin mahdollistanut henkilöbrändäyksen hyvin laajalle yleisölle. Onkin arvioitu, että sosiaalisen median kanavat ovat nykyisin pääasiallisia areenoita henkilöbrändäykselle. Lisäksi digitaalinen viestintä ja sosiaalinen media ovat luoneet uuden viestinnän muodon: yksilöiden joukkoviestinnän. Näin ollen näyttää siltä, että sosiaalinen media on ollut sekä henkilöbrändäys-ilmiön aiheuttaja että mahdollistaja. Informaatioteknologian vallankumouksen aikana on kasvanut myös kaksi uutta sukupolvea, joiden tavat käyttää teknologiaa eroavat merkitta…

Professional brandingSelf-brandingInternetMass self-communicationbrändäysOnline identitysosiaalinen mediaPersonal brandingVerkkoidentiteettiHenkilöbrändäyshenkilötbränditHenkilöbrändiasiantuntijatjoukkoviestintäAsiantuntijabrändiidentiteetti
researchProduct

Time Up for Phishing with Effective Anti-Phishing Research Strategies

2015

Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Thir…

Social computingbusiness.industryManagement of Technology and InnovationComputer Science (miscellaneous)Information systemSocial consciousnessOnline identityBusinessPublic relationsPhishingSoftware qualityVulnerability (computing)Protection mechanismInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Identity Use and Misuse of Public Persona on Twitter

2016

Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…

ta113online identity: G20 leaders: Putinbusiness.industryComputer sciencesocial media05 social sciencesInternet privacyTwitterIdentity (social science)sosiaalinen media050801 communication & media studiesPersonafaked accountsG20 leaders: Putin [online identity]ObamaimpersonationErdogan0508 media and communications0502 economics and business050211 marketingta518business
researchProduct