Search results for "online social network"

showing 10 items of 27 documents

Logical Key Hierarchy for Group Management in Distributed Online Social Networks

2016

Distributed Online Social Networks (DOSNs) have recently been proposed to shift the control over user data from a unique entity to the users of the DOSN themselves. In this paper, we focus our attention on the problem of privacy preserving content sharing to a large group of users of the DOSNs. Several solutions, based on cryptographic techniques, have been recently proposed. The main challenge here is the definition of a scalable and decentralized approach that: i) minimizes the re-encryption of the contents published in a group when the composition of the group changes and ii) enables a fast distribution of the cryptographic keys to all the members (n) of a group, each time a new user is …

Computer scienceComputer Networks and CommunicationsCryptography02 engineering and technologyEncryptionSet (abstract data type)Public-key cryptography0202 electrical engineering electronic engineering information engineeringMathematics (all)Distributed Online Social Network; Privacy; Secure Group communicationFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)020206 networking & telecommunicationsComputer Science Applications1707 Computer Vision and Pattern RecognitionSecure Group communicationDistributed Online Social NetworkPrivacyScalabilitySignal ProcessingKey (cryptography)020201 artificial intelligence & image processingbusinessSoftwareComputer network
researchProduct

Towards better privacy preservation by detecting personal events in photos shared within online social networks

2015

Today, social networking has considerably changed why people are taking pictures all the time everywhere they go. More than 500 million photos are uploaded and shared every day, along with more than 200 hours of videos every minute. More particularly, with the ubiquity of smartphones, social network users are now taking photos of events in their lives, travels, experiences, etc. and instantly uploading them online. Such public data sharing puts at risk the users’ privacy and expose them to a surveillance that is growing at a very rapid rate. Furthermore, new techniques are used today to extract publicly shared data and combine it with other data in ways never before thought possible. Howeve…

CybersecurityDétection d’évènements[INFO.INFO-OH]Computer Science [cs]/Other [cs.OH]Cyber SecurityEvent relationsData analysisRéseaux sociauxAnonymization[INFO] Computer Science [cs]Regroupement d’imagesRelations entre les évènementsCyber sécuritéPrivacy protection[INFO]Computer Science [cs]Protection de la vie privéeOnline social networksDétection d'évènementsMetadataAnonymisationIdentité numériqueAnalyse de donnéesOnline identityImage clustering[INFO.INFO-OH] Computer Science [cs]/Other [cs.OH]MétadonnéesSocial Networks[ INFO.INFO-OH ] Computer Science [cs]/Other [cs.OH]Event detection
researchProduct

Evaluating the impact of friends in predicting user’s availability in online social networks

2017

In recent years, Online Social Networks (OSNs) have changed the way people connect and interact with each other. Indeed, most people have registered an account on some popular OSNs (such as Facebook, or Google+) which is used to access the system at different times of the days, depending on their life and habits. In this context, understanding how users connect to the OSNs is of paramount importance for both the protection of their privacy and the OSN’s provider (or third-party applications) that want to exploit this information. In this paper, we study the task of predicting the availability status (online/offline) of the OSNs’ users by exploiting the availability information of their frie…

ExploitOnline Social NetworkSettore INF/01 - Informaticabusiness.industryComputer sciencePersonal behaviorInternet privacyContext (language use)Availability predictionTask (project management)Theoretical Computer ScienceWorld Wide WebComputer Sciencebusiness
researchProduct

Forma mentis networks map how nursing and engineering students enhance their mindsets about innovation and health during professional growth

2020

Reconstructing a “forma mentis”, a mindset, and its changes, means capturing how individuals perceive topics, trends and experiences over time. To this aim we use forma mentis networks (FMNs), which enable direct, microscopic access to how individuals conceptually perceive knowledge and sentiment around a topic, providing richer contextual information than machine learning. FMNs build cognitive representations of stances through psycholinguistic tools like conceptual associations from semantic memory (free associations, i.e., one concept eliciting another) and affect norms (valence, i.e., how attractive a concept is). We test FMNs by investigating how Norwegian nursing and engineering stude…

General Computer ScienceEntropymedia_common.quotation_subjectClosenessComplex networksNetwork Science and Online Social NetworksMindset050105 experimental psychologyPsycholinguisticslcsh:QA75.5-76.95Education03 medical and health sciences0302 clinical medicineNursingLearning outcomesPerceptionOpenness to experienceStance detection0501 psychology and cognitive sciencesmedia_commonTeamworkPsycholinguisticsData Science05 social sciencesProfessional developmentHealthcareCognitionSTEMComputational LinguisticsAttitudeVDP::Medisinske Fag: 700::Helsefag: 800lcsh:Electronic computers. Computer science030217 neurology & neurosurgeryMindset modelling
researchProduct

Prevention of hate speech crimes: digital versus real-life environment

2022

Extending the use of social media and other digital networks, as well as technology development and the impact of the pandemic have raised the problem of how to prevent hateful speech from occurring. Limitations on hate speech closely correlate with restriction of freedom of speech, therefore balance between the two should be met to ensure both fundamental democratic right on the freedom of speech, as well as to restrict limitations on one’s honour, dignity and safety. To answer whether mechanisms for combating the crimes of hate speech in the digital environment are as effective as they are in a real-life situation, the author analyses the international (United Nations) and Council of Euro…

Hate crimesHate speechEuropean Court of Human Rights:LAW/JURISPRUDENCE::Other law::European law [Research Subject Categories]Online social networks
researchProduct

Distributed Coverage of Ego Networks in F2F Online Social Networks

2016

Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …

Information privacyComputer scienceCryptography02 engineering and technologyWorld Wide WebSet (abstract data type)Artificial IntelligenceDistributed online social networksDominating setServer0202 electrical engineering electronic engineering information engineering1707P2PSettore INF/01 - InformaticaSocial networkDistributed databasebusiness.industryFriend-to-friend networkComputer Science Applications1707 Computer Vision and Pattern Recognition020206 networking & telecommunicationsData AvailabilityDistributed Online Social NetworkDistributed Online Social Networks; P2P; Data Availability; friend-to-friend networksComputer Networks and CommunicationPrivacyDistributed algorithm020201 artificial intelligence & image processingfriend-to-friend networksbusinessComputer network2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld)
researchProduct

Privacy and temporal aware allocation of data in decentralized online social networks

2017

Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…

Information privacyComputer sciencePrivacy policyControl (management)02 engineering and technologyInterval (mathematics)Computer securitycomputer.software_genreAvailability predictionTheoretical Computer ScienceSet (abstract data type)0202 electrical engineering electronic engineering information engineeringFocus (computing)Social networkSettore INF/01 - Informaticabusiness.industry020206 networking & telecommunicationsData availabilityOrder (business)Computer ScienceDecentralized online social networkDecentralized online social networks020201 artificial intelligence & image processingbusinesscomputerData privacyComputer network
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct

Parent and peer attachment as predictors of facebook addiction symptoms in different developmental stages (early adolescents and adolescents)

2019

Abstract Facebook Addiction (FA) is a problem that concerns minors all over the world. The attachment bond with peers and parents has been proven to be a risk factor for the onset of FA. However, the family and peer group can have a different importance depending on the developmental period of the minor. This study examined the influence of peer and parental attachment on the symptoms of FA in early adolescents and adolescents to verify whether attachment to peers and parents predicts FA symptoms in both categories respectively. The sample was composed of 598 participants (142 early adolescents) between the ages of 11 and 17 years (M age = 14.82, SD = 1.52) recruited in the school setting. …

MaleSocial AlienationAdolescentFamily ConflictPeer attachmentmedia_common.quotation_subjecteducationMedicine (miscellaneous)Parent attachmentPeer relationshipsTrustToxicologyPeer attachmentPeer GroupAdolescence; Facebook addiction; Parent attachment; Peer attachment; Problematic internet useDevelopmental stage theoriesRisk FactorsHumansInterpersonal RelationsParent-Child RelationsRisk factorChildmedia_commonCommunicationAddictionSchool settingPeer groupDissent and DisputesObject AttachmentAdolescenceBehavior AddictiveAffectPsychiatry and Mental healthClinical PsychologyItalyOnline Social NetworkingEarly adolescentsFemaleProblematic internet usePsychologyFacebook addictionClinical psychologyAddictive Behaviors
researchProduct

DiDuSoNet: A P2P architecture for Ditributed Dunbar-based Social Networks,

2015

Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, informati…

P2PExploitSocial networkbusiness.industryComputer scienceComputer Networks and CommunicationsControl (management)Face (sociological concept)020206 networking & telecommunicationsSocial Welfare02 engineering and technologyDistributed Online Social NetworksData availabilityDistributed Online Social NetworkSet (abstract data type)World Wide WebData availability0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingDistributed Online Social Networks; P2P; Data availability; DunbarDunbarArchitecturebusinessSoftware
researchProduct