Search results for "Online identity"
showing 4 items of 4 documents
Towards better privacy preservation by detecting personal events in photos shared within online social networks
2015
Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…
Communication students' motives for and attitudes towards personal branding
2015
Henkilöbrändäys ja profiloituminen ovat olleet pitkään eri alojen kuuluisuuksien etuoikeus. Sosiaalinen media on kuitenkin mahdollistanut henkilöbrändäyksen hyvin laajalle yleisölle. Onkin arvioitu, että sosiaalisen median kanavat ovat nykyisin pääasiallisia areenoita henkilöbrändäykselle. Lisäksi digitaalinen viestintä ja sosiaalinen media ovat luoneet uuden viestinnän muodon: yksilöiden joukkoviestinnän. Näin ollen näyttää siltä, että sosiaalinen media on ollut sekä henkilöbrändäys-ilmiön aiheuttaja että mahdollistaja. Informaatioteknologian vallankumouksen aikana on kasvanut myös kaksi uutta sukupolvea, joiden tavat käyttää teknologiaa eroavat merkitta…
Time Up for Phishing with Effective Anti-Phishing Research Strategies
2015
Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Thir…
Identity Use and Misuse of Public Persona on Twitter
2016
Social media sites have appeared during the last 10 years and their use has exploded all over the world. Twitter is a microblogging service that has currently 320 million user profiles and over 100 million daily active users. Many celebrities and leading politicians have a verified profile on Twitter, including Justin Bieber, president Obama, and the Pope. In this paper we investigate the '‘hundreds of Putins and Obamas phenomenon’ on Twitter. We collected two data sets in 2015 containing 582 and 6477 profiles that are related to the G20 leaders’ profiles on Twitter. The number of namesakes varied from 5 to 1000 per leader. We analysed in detail various aspects of the Putin and Erdogan rela…