Search results for "privacy"

showing 10 items of 402 documents

A Study of a Social Behavior inside the Online Black Markets

2010

Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …

Exploitbusiness.industryComputer scienceInternet privacycomputer.software_genreComputer securitySoftwareMalwareThe InternetBlack marketbusinessCyberspacecomputerCyber threats2010 Fourth International Conference on Emerging Security Information, Systems and Technologies
researchProduct

A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks

2017

International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…

FOS: Computer and information sciencesComputer Science - Cryptography and SecurityComputer scienceWireless ad hoc networklocation privacy02 engineering and technologysecurityPseudonymComputer securitycomputer.software_genre[SPI]Engineering Sciences [physics]0203 mechanical engineeringpseudonym changing0202 electrical engineering electronic engineering information engineeringVANETsElectrical and Electronic EngineeringAuthenticationVehicular ad hoc networksAuthenticationComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS020206 networking & telecommunications020302 automobile design & engineeringRoadsSoftware deploymentPrivacyInitial phaseComputingMilieux_COMPUTERSANDSOCIETYSafetycomputerCryptography and Security (cs.CR)
researchProduct

An exploratory study of COVID-19 misinformation on Twitter.

2020

During the COVID-19 pandemic, social media has become a home ground for misinformation. To tackle this infodemic, scientific oversight, as well as a better understanding by practitioners in crisis management, is needed. We have conducted an exploratory study into the propagation, authors and content of misinformation on Twitter around the topic of COVID-19 in order to gain early insights. We have collected all tweets mentioned in the verdicts of fact-checked claims related to COVID-19 by over 92 professional fact-checking organisations between January and mid-July 2020 and share this corpus with the community. This resulted in 1 500 tweets relating to 1 274 false and 276 partially false cla…

FOS: Computer and information sciencesCoronavirus disease 2019 (COVID-19)Computer Networks and CommunicationsDiffusion of informationInternet privacyTwitterExploratory research02 engineering and technologyCrisis managementFalse accusationArticleSocial mediaComputer Science - Computers and SocietyOrder (exchange)Computers and Society (cs.CY)0202 electrical engineering electronic engineering information engineeringSocial mediaMisinformationSocial and Information Networks (cs.SI)business.industryCommunicationCOVID-19Computer Science - Social and Information Networks020206 networking & telecommunicationsExploratory analysisVDP::Samfunnsvitenskap: 200::Sosiologi: 220CoronavirusInformatikFake newsMisinformation020201 artificial intelligence & image processingPsychologybusinessInformation SystemsOnline social networks and media
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

Facebook’s ad hoc groups: a potential source of communicative power of networked citizens

2017

Ad hoc groups (sporadically formed on social network sites for achieving particular common objectives) have been seen as a public space for citizen participation and debate. This study focuses on Facebook’s ad hoc groups in Finland. The aim is to detect the potential of these groups to enhance networked citizens’ communicative power for raising societally important issues to public agenda and initiate changes in society. We suggest a categorization of the groups according to their missions, and present their members’ specific motivations and objectives through an online survey. Despite the general entertainment-orientation and self-referential nature of social media, the results show that a…

FacebookComputer sciencesocial mediaInternet privacysosiaalinen mediajournalismfifth estateaudience-driven agenda settinglcsh:Communication. Mass mediaSocial mediaPower (social and political)Public spacead hoc groupsSocial mediafacebookFifth EstateNews mediaSocial networkbusiness.industryCommunicationlcsh:P87-96lcsh:Advertisingcommunicative powerCategorizationjournalismiJournalismlcsh:HF5801-6182businessCommunication & Society (Formerly Comunicación y Sociedad)
researchProduct

Facebookin tietoturvasta

2015

Tämä työ sai alkunsa, kun kiinnostuin Internetin tietoturvasta Edward Snowdenin paljastusten myötä. Aluksi selvitän käsitteet sosiaalinen media ja tietoturva. Sitten yhdistän nämä käsitteet, tutkien sosiaalisen median tietoturvaa Facebookin tapauksessa. Esittelen tutkimuslähteiden valossa ilmenneitä keskeisempiä turvallisuusuhkia, jotka liittyvät Facebookiin ja vaikuttavat käyttäjien yksityisyyteen ja tietoturvaan. Tietoisuuden lisääminen mahdollisista uhista osoittautui parhaaksi keinoksi niiden torjunnassa. This work began when I became interested in Internet data security because of Edward Snowden revelations. First, I explain the concepts of social media and security. Then I combine the…

Facebooksecurityprivacy
researchProduct

“If you take away my phone, you take away my life...” Community Narratives about the Social Implications of Mobile phone Usage for Livelihood Security

2019

Smallholder farmers in developing regions like sub-Saharan Africa still grapple with development challenges like poverty, illiteracy, food insecurity, poor infrastructures like roads and limited access to learning opportunities. Moreover, amidst all these challenges, these possess mobile phones as they continuously engage in diverse livelihood activities. Echoed in previous research, mobile phones are the most diffused technologies available in many rural communities. Yet, most mobile technological interventions are urban-based projects neglecting rural locales in harnessing mobile phone usage. More so, mobile for development research uses quantitative methods which limits proper interrogat…

Financial inclusionPovertybusiness.industryMobile phonePhonemedia_common.quotation_subjectInternet privacyPsychological interventionBusinessLivelihoodFunctional illiteracyLiteracymedia_common
researchProduct

Prefazione a Libertà di espressione e costo del consenso nell'era della condivisione digitale. Analisi comparatistica di A. Mendola

2023

Freedom of Informationpersonal dataSettore IUS/01 - Diritto PrivatoSettore IUS/02 - Diritto Privato Comparatoprivacy
researchProduct

WHAT ARE YOU THINKING ABOUT? FREEDOM OF EXPRESSION AND LABOUR LAW IN TIMES OF SOCIAL NETWORKS

2022

Il saggio esamina i limiti all'utilizzo dei social network del lavoratore nel contesto della re-lazione di lavoro e nella vita privata. Nella prima parte ci si sofferma sulla questione del monitoraggio tecnologico dei dipendenti, alla luce della disciplina in tema di privacy e con-trollo a distanza dei lavoratori. Nella seconda parte l'attenzione è concentrata sulle condot-te extra lavorative e sulla loro possibile incidenza sulla relazione lavorativa. Filo condutto-re dell'analisi è la verifica degli spazi di tutela dei diritti della personalità, alla luce dell'ap-plicazione giurisprudenziale più recente. The current work examines the boundaries to the use of social networks by workers wit…

Freedom of expression-right to criticism-privacy-power of control-social network.Libertà di espressione-diritto di critica-privacy-potere di controllo-social media.Settore IUS/07 - Diritto Del Lavoro
researchProduct

"A cosa stai pensando?". Libertà di pensiero e diritto del lavoro ai tempi dei social network

2020

Il saggio esamina i limiti all'utilizzo dei social network del lavoratore nel contesto della re-lazione di lavoro e nella vita privata. Nella prima parte ci si sofferma sulla questione del monitoraggio tecnologico dei dipendenti, alla luce della disciplina in tema di privacy e con-trollo a distanza dei lavoratori. Nella seconda parte l'attenzione è concentrata sulle condot-te extra lavorative e sulla loro possibile incidenza sulla relazione lavorativa. Filo condutto-re dell'analisi è la verifica degli spazi di tutela dei diritti della personalità, alla luce dell'ap-plicazione giurisprudenziale più recente. The current work examines the boundaries to the use of social networks by workers wit…

Freedom of expression-right to criticism-privacy-power of control-social network.Settore IUS/07 - Diritto Del LavoroLibertà di espressione-diritto di critica-riservatezza-potere di controllo-social network.
researchProduct