This document summarizes research on social media privacy and security concerns. It outlines the purpose of understanding how users can better manage their social media privacy and reduce risks. Research questions ask how users can enable themselves to be better social media users and how to increase awareness of diminishing privacy protections. Results found most users concerned about privacy breaches and security but unaware of privacy settings. The conclusion is that more user-friendly privacy controls and educating users on social media research is recommended.
Privacy Concerns vs. User Behavior in Community Question AnsweringNicolas Kourtellis
Community-based question answering (CQA) platforms are crowd-sourced services for sharing user expertise on various topics, from mechanical repairs to parenting. While they naturally build-in an online social network infrastructure, they carry a very different purpose from Facebook-like social networks, where users “hang-out” with their friends and tend to share more personal information. It is unclear, thus, how the privacy concerns and their correlation with user behavior in an online social network translate into a CQA platform. This study analyzes one year of recorded traces from a mature CQA platform to understand the association between users’ privacy concerns as manifested by their account settings and their activity in the platform. The results show that privacy preference is correlated with behavior in the community in terms of engagement, retention, accomplishments and deviance from the norm. We find privacy-concerned users have higher qualitative and quantitative contributions, show higher retention, report more abuses, have higher perception on answer quality and have larger social circles. However, at the same time, these users also exhibit more deviant behavior than the users with public profiles.
I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi and F. Bonchi. Privacy Concerns vs. User Behavior in Community Question Answering. In IEEE/ACM ASONAM, Aug. 2015.
Social Networks in Health Care - Talk at ICSE 2010James Williams
A talk given at the Software Engineering for Health Care workshop at ICSE 2010 (Cape Town). Reviews privacy and security issues for social networking in the health care domain, covers some existing work, and points out future directions.
The Use of Social Media (Tools) in Clinical Research CollaborationJoel Selzer
These are the supporting slides from my talk at the Society of Clinical Research Associates conference on "Harnessing Social Media to Advance Clinical Research", August 2, 2013 in Philadelphia.
Privacy Concerns vs. User Behavior in Community Question AnsweringNicolas Kourtellis
Community-based question answering (CQA) platforms are crowd-sourced services for sharing user expertise on various topics, from mechanical repairs to parenting. While they naturally build-in an online social network infrastructure, they carry a very different purpose from Facebook-like social networks, where users “hang-out” with their friends and tend to share more personal information. It is unclear, thus, how the privacy concerns and their correlation with user behavior in an online social network translate into a CQA platform. This study analyzes one year of recorded traces from a mature CQA platform to understand the association between users’ privacy concerns as manifested by their account settings and their activity in the platform. The results show that privacy preference is correlated with behavior in the community in terms of engagement, retention, accomplishments and deviance from the norm. We find privacy-concerned users have higher qualitative and quantitative contributions, show higher retention, report more abuses, have higher perception on answer quality and have larger social circles. However, at the same time, these users also exhibit more deviant behavior than the users with public profiles.
I. Kayes, N. Kourtellis, D. Quercia, A. Iamnitchi and F. Bonchi. Privacy Concerns vs. User Behavior in Community Question Answering. In IEEE/ACM ASONAM, Aug. 2015.
Social Networks in Health Care - Talk at ICSE 2010James Williams
A talk given at the Software Engineering for Health Care workshop at ICSE 2010 (Cape Town). Reviews privacy and security issues for social networking in the health care domain, covers some existing work, and points out future directions.
The Use of Social Media (Tools) in Clinical Research CollaborationJoel Selzer
These are the supporting slides from my talk at the Society of Clinical Research Associates conference on "Harnessing Social Media to Advance Clinical Research", August 2, 2013 in Philadelphia.
Privacy and social media for Australian governmentsCraig Thomler
This presentation, given in both the Canberra and Adelaide Social Media conferences by Akolade, provides a view on the dangers and mitigations for privacy concerns when government agencies use social media
Covering the basics of the top social media platforms for this particular audience; discussing privacy issues and how to lock your account down (if you want to do that); and then the evolution of social media customer service.
In this PowerPoint presentation the students were asked to classify the learnt animals into: Farm animals, Wild animals and Insects. The students belong to 6th grade.-
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnakiRuth Lemon
In term 1, the year 6-8 rūmaki reo Māori class were preparing for camp and for art exhibition. We found out that there were eels in the river by Kōkako Lodge, so we decided to design our own hīnaki and to explore tuna.
2012年度全国高等専門学校プログラミングコンテンスト、自由部門に出場し特別賞を受賞した”TERAKOYA”のプレゼンテーション資料です。
説明の追記を一切していないので、雰囲気しか伝わらないかも知れません。余裕が有ればそのうち、他の資料の様にPublic版を作る、かもしれません。
This is the slide for presentation at Procon 2012 which held in October 2012.
Presentaion introducing our system "TERAKOYA".
The Slide is Japanese only. Thank you.
A Recipe For $uccess: Tracking & Converting Supporters for Maximum ResultsCare2Team
*Watch or download the full webinar (with audio and slides) at: http://bit.ly/c2recipe
"So you've acquired them. Now what?!"
Converting new subscribers to donors of course depends on the RIGHT communication strategy; but maximizing the return on your online constituency growth investment depends on the RIGHT data and the RIGHT interpretation.
Do you have a plan? Do you know what to look for? ...and what it all means?
Join Janna Chan of the Center for Reproductive Rights (formerly of Lambda Legal and M+R Strategic Services) and two Grams (Jaime Grams of Integral and Dane Grams of Care2, formerly of GLSEN and HRC) for our latest Expert Webinar:
"A Recipe for $uccess: Tracking & Converting to Maximize Returns" on Tuesday 5/22 at 2PM ET
Learn from this real-life example how to manage and track new online subscribers and how it can help guide you on your communications and fundraising, as well as pinpoint the real value of your nonprofit's supporters.
In this webinar you will learn:
Why it is important to recruit new supporters
How to keep online subscribers engaged, involved and converting to donors
What are the right metrics for measuring success, short term and long term
How to compare your online investment to other direct response and marketing channels
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale
Privacy and social media for Australian governmentsCraig Thomler
This presentation, given in both the Canberra and Adelaide Social Media conferences by Akolade, provides a view on the dangers and mitigations for privacy concerns when government agencies use social media
Covering the basics of the top social media platforms for this particular audience; discussing privacy issues and how to lock your account down (if you want to do that); and then the evolution of social media customer service.
In this PowerPoint presentation the students were asked to classify the learnt animals into: Farm animals, Wild animals and Insects. The students belong to 6th grade.-
Ngā rauemi hāpai i tā mātou rangahau me te toi mō ngā tuna me ngā hīnakiRuth Lemon
In term 1, the year 6-8 rūmaki reo Māori class were preparing for camp and for art exhibition. We found out that there were eels in the river by Kōkako Lodge, so we decided to design our own hīnaki and to explore tuna.
2012年度全国高等専門学校プログラミングコンテンスト、自由部門に出場し特別賞を受賞した”TERAKOYA”のプレゼンテーション資料です。
説明の追記を一切していないので、雰囲気しか伝わらないかも知れません。余裕が有ればそのうち、他の資料の様にPublic版を作る、かもしれません。
This is the slide for presentation at Procon 2012 which held in October 2012.
Presentaion introducing our system "TERAKOYA".
The Slide is Japanese only. Thank you.
A Recipe For $uccess: Tracking & Converting Supporters for Maximum ResultsCare2Team
*Watch or download the full webinar (with audio and slides) at: http://bit.ly/c2recipe
"So you've acquired them. Now what?!"
Converting new subscribers to donors of course depends on the RIGHT communication strategy; but maximizing the return on your online constituency growth investment depends on the RIGHT data and the RIGHT interpretation.
Do you have a plan? Do you know what to look for? ...and what it all means?
Join Janna Chan of the Center for Reproductive Rights (formerly of Lambda Legal and M+R Strategic Services) and two Grams (Jaime Grams of Integral and Dane Grams of Care2, formerly of GLSEN and HRC) for our latest Expert Webinar:
"A Recipe for $uccess: Tracking & Converting to Maximize Returns" on Tuesday 5/22 at 2PM ET
Learn from this real-life example how to manage and track new online subscribers and how it can help guide you on your communications and fundraising, as well as pinpoint the real value of your nonprofit's supporters.
In this webinar you will learn:
Why it is important to recruit new supporters
How to keep online subscribers engaged, involved and converting to donors
What are the right metrics for measuring success, short term and long term
How to compare your online investment to other direct response and marketing channels
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
Ensuring privacy of users of social networks is probably an unsolvable conundrum. At the same time, an informed use of the existing privacy options by the social network participants may alleviate - or even prevent - some of the more drastic privacy-averse incidents. Unfortunately, recent surveys show that an average user is either not aware of these options or does not use them, probably due to their perceived complexity. It is therefore reasonable to believe that tools assisting users with two tasks: 1) understanding their social net behaviour in terms of their privacy settings and broad privacy categories, and 2)recommending reasonable privacy options, will be a valuable tool for everyday privacy practice in a social
network context. This paper presents YourPrivacyProtector, a recommender system that shows how simple machine learning techniques may provide useful assistance in these two tasks to Facebook users. We support our claim with empirical results of application of YourPrivacyProtector to two groups of Facebook
users.
Social Media Influence Analysis using Data Science TechniquesMuhammad Bilal
The major purpose of this literature search report is to demonstrate the usage of different tactics of data science to investigate impact of social media while considering the interaction between influences and their followers.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...ijsptm
The privacy of personal information is an important issue affecting the confidence of internet users. The
widespread adoption of online social networks and access to these platforms using mobile devices has
encouraged developers to make the systems and interfaces acceptable to users who seek privacy. The aim
of this study is to test a wizard that allows users to control the sharing of personal information with others.
We also assess the concerns of users in terms of such sharing such as whether to hide personal data in
current online social network accounts. Survey results showed the wizard worked very well and that
females concealed more personal information than did males. In addition, most users who were concerned
about misuse of personal information hid those items. The results can be used to upgrade current privacy
systems or to design new systems that work on mobile internet devices. The system can also be used to save
time when setting personal privacy settings and makes users more aware of items that will be shared with
others.
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
Presentation to WARC and ESOMAR digital conference on Web2.0. Processes for research innovation, technology and collective intelligence.
Dr Mariann Hardey, Lecturer in Social Media Marketing, Durham Business School, University of Durham.
July IAP: Confidential Information - Storage, Sharing, & Publication - with M...Micah Altman
This class focuses on the tools and good practices for storing confidential data, sharing data for collaboration, and publishing data or derivative results for broad use. Topics covered in this class include: an overview of information security standards and frameworks; information security core practices (credentials, authentication, authorization, and auditing); information partitioning and secure linking; file, disk, and network encryption tools and practices; cloud storage practices for confidential information; data “de-identification” tools and practices; statistical disclosure limitation approaches and tools; and data use agreements.
Similar to Security Concerns With Privacy in Social Media (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
7. Research Purpose ~ Research Questions The purpose of this research is gain an understanding into user’s perceived responsibilities when using social media. This, in turn, will help develop an enlightened approach to how users can better equip themselves to manage the privacy of their social identity. How can social media users enable themselves to be better users by reducing risk? In what ways can one facilitate awareness among social media users to offset diminishing privacy restrictions and security protocols?
9. Current Research Results Facebook Facebook Account Hacked Facebook Security/Privacy Topic Profile: Facebook, Social Media Security & Privacy. Keywords:api, account hacked, privacy breach, viruses Sentiment Subjects:facebook, privacy Regions: United States Languages: English
13. Why?To help users reduce riskThis is an addition to previous and current research being conducted in the area of Information & Privacy Technology.
14.
15. References http://amor.cms.hu/berlin.de/~spiekers/website/pdfs/ONLINE_SOCIAL_NETWORKS_WHY_WE_DISCLOSE_JIT.pdf danahboyd and Nicole Ellison “Social Network Sites: Definition, History, and Scholarship,” . In Journal of Computer-Mediated Communication, 2007 danahhoyd “Social Network Sites: Public, Private, or What?”. Knowledge Tree 13, May 2007 Balachander, Krishnamurthy and Criag E. Willis. “Characterizing Privacy in Online Social Networks”. In proceedings of WOSN, August 2008 Felt, Adrienne and Davis Evans. “Privacy Protection for Social Networking API’s”. August 2007 Dwyer et al. “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace”. In proceedings of the Thirteenth Americas Conference on Information Systems, August 2007 Chew, Monica et al. ,“Undermining Privacy in Social Networks”. In proceedings of the w2sp conference , August 2008 Squicciarini, Anna et al. “Collective Privacy Management in Social Networks”. In proceedings of the International World Wide Web Conference Committee, April 2009 Pekarek, Martin et al., “Privacy and Social Network Sites: Follow the Money!”, In proceedings of the W3C Workshop on the Future of Social Networking, January 2009. Hogben, G . “Security Issues and Recommendations for Online Social Networks”. ENISA Position Paper No.1, October 2007