Search results for "privacy"
showing 10 items of 402 documents
A Study of a Social Behavior inside the Online Black Markets
2010
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …
A survey on pseudonym changing strategies for Vehicular Ad-Hoc Networks
2017
International audience; The initial phase of the deployment of vehicular ad-hoc networks (VANETs) has begun and many research challenges still need to be addressed. Location privacy continues to be in the top of these challenges. Indeed, both academia and industry agreed to apply the pseudonym changing approach as a solution to protect the location privacy of VANETs' users. However, due to the pseudonyms linking attack, a simple changing of pseudonym shown to be inefficient to provide the required protection. For this reason, many pseudonym changing strategies have been suggested to provide an effective pseudonym changing. Unfortunately, the development of an effective pseudonym changing st…
An exploratory study of COVID-19 misinformation on Twitter.
2020
During the COVID-19 pandemic, social media has become a home ground for misinformation. To tackle this infodemic, scientific oversight, as well as a better understanding by practitioners in crisis management, is needed. We have conducted an exploratory study into the propagation, authors and content of misinformation on Twitter around the topic of COVID-19 in order to gain early insights. We have collected all tweets mentioned in the verdicts of fact-checked claims related to COVID-19 by over 92 professional fact-checking organisations between January and mid-July 2020 and share this corpus with the community. This resulted in 1 500 tweets relating to 1 274 false and 276 partially false cla…
Blockchain-Based Proof of Location
2016
Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.
Facebook’s ad hoc groups: a potential source of communicative power of networked citizens
2017
Ad hoc groups (sporadically formed on social network sites for achieving particular common objectives) have been seen as a public space for citizen participation and debate. This study focuses on Facebook’s ad hoc groups in Finland. The aim is to detect the potential of these groups to enhance networked citizens’ communicative power for raising societally important issues to public agenda and initiate changes in society. We suggest a categorization of the groups according to their missions, and present their members’ specific motivations and objectives through an online survey. Despite the general entertainment-orientation and self-referential nature of social media, the results show that a…
Facebookin tietoturvasta
2015
Tämä työ sai alkunsa, kun kiinnostuin Internetin tietoturvasta Edward Snowdenin paljastusten myötä. Aluksi selvitän käsitteet sosiaalinen media ja tietoturva. Sitten yhdistän nämä käsitteet, tutkien sosiaalisen median tietoturvaa Facebookin tapauksessa. Esittelen tutkimuslähteiden valossa ilmenneitä keskeisempiä turvallisuusuhkia, jotka liittyvät Facebookiin ja vaikuttavat käyttäjien yksityisyyteen ja tietoturvaan. Tietoisuuden lisääminen mahdollisista uhista osoittautui parhaaksi keinoksi niiden torjunnassa. This work began when I became interested in Internet data security because of Edward Snowden revelations. First, I explain the concepts of social media and security. Then I combine the…
“If you take away my phone, you take away my life...” Community Narratives about the Social Implications of Mobile phone Usage for Livelihood Security
2019
Smallholder farmers in developing regions like sub-Saharan Africa still grapple with development challenges like poverty, illiteracy, food insecurity, poor infrastructures like roads and limited access to learning opportunities. Moreover, amidst all these challenges, these possess mobile phones as they continuously engage in diverse livelihood activities. Echoed in previous research, mobile phones are the most diffused technologies available in many rural communities. Yet, most mobile technological interventions are urban-based projects neglecting rural locales in harnessing mobile phone usage. More so, mobile for development research uses quantitative methods which limits proper interrogat…
Prefazione a Libertà di espressione e costo del consenso nell'era della condivisione digitale. Analisi comparatistica di A. Mendola
2023
WHAT ARE YOU THINKING ABOUT? FREEDOM OF EXPRESSION AND LABOUR LAW IN TIMES OF SOCIAL NETWORKS
2022
Il saggio esamina i limiti all'utilizzo dei social network del lavoratore nel contesto della re-lazione di lavoro e nella vita privata. Nella prima parte ci si sofferma sulla questione del monitoraggio tecnologico dei dipendenti, alla luce della disciplina in tema di privacy e con-trollo a distanza dei lavoratori. Nella seconda parte l'attenzione è concentrata sulle condot-te extra lavorative e sulla loro possibile incidenza sulla relazione lavorativa. Filo condutto-re dell'analisi è la verifica degli spazi di tutela dei diritti della personalità, alla luce dell'ap-plicazione giurisprudenziale più recente. The current work examines the boundaries to the use of social networks by workers wit…
"A cosa stai pensando?". Libertà di pensiero e diritto del lavoro ai tempi dei social network
2020
Il saggio esamina i limiti all'utilizzo dei social network del lavoratore nel contesto della re-lazione di lavoro e nella vita privata. Nella prima parte ci si sofferma sulla questione del monitoraggio tecnologico dei dipendenti, alla luce della disciplina in tema di privacy e con-trollo a distanza dei lavoratori. Nella seconda parte l'attenzione è concentrata sulle condot-te extra lavorative e sulla loro possibile incidenza sulla relazione lavorativa. Filo condutto-re dell'analisi è la verifica degli spazi di tutela dei diritti della personalità, alla luce dell'ap-plicazione giurisprudenziale più recente. The current work examines the boundaries to the use of social networks by workers wit…