Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
Online Social Networks: 5 threats and 5 ways to use them safelyTom Eston
I spent the last few months doing research on various social networks specifically MySpace, Facebook, LinkedIn. Many of us either use these sites or know others that do. Users of these sites have been increasing at a dramatic rate for several years. For example, MySpace was the most visited website in the US with more than 114 million global visitors in 2007, and Facebook increased its global unique visitor numbers by 270% last year alone. With this massive increase in social network usage, online social networking is now becoming the fastest growing area of privacy concerns and security threats.
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
This presentation gives an overview of various security issues in mobile phones having different operating systems. Ways to avoid spamming and malware in our mobile phones are also presented.
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
A4.1
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2009
Forensics Tools for Social Network Security
Solution
s
Janet Cheng, Jennifer Hoffman, Therese LaMarche, Ahmet Tavil, Amit Yavad, and Steve Kim
Seidenberg School of CSIS, Pace University, White Plains, NY 10606, USA
Abstract
The usage of Social Network Sites has increased
rapidly in recent years. Since the success of a Social
Network Site depends on the number of users it
attracts, there is pressure on providers of Social
Network sites to design systems that encourage
behavior which increases both the number of users
and their connections. However, like any fast-
growing technology, security has not been a high
priority in the development of Social Network Sites.
As a result, along with the benefits of Social Network
Sites, significant security risks have resulted.
Providing Social Network Site users with tools which
will help protect them is ideal. Tools are developed
for installation on a user’s computer to provide them
the ability to retrieve other online user information
via chat and social network websites. These tools will
also benefit law enforcement agents when crimes are
committed.
1. Introduction
This paper analyzes and extends the forensic tools
developed in an earlier study for protecting Social
Network Site users from security threats [14]. First,
we will identify the security issues found in Social
Network Sites. Second, we will demonstrate how our
tools can provide users with more information which
we hope will help prevent them from becoming
victims. Finally, if a crime has been committed, we
will detail the tools available to assist in
apprehending the perpetrator.
The tools we developed retrieve Social Network Site
user’s non-personal-identifiable information, such as
IP address, operating system, browser type, etc.
Retrieval of this information occurs upon the virtual
contact from that other person, be it by them simply
browsing our personal page, or by other person
contacting via Virtual Meeting, for example chatting.
This paper covers methodologies used, test results,
and future goals.
The Social Network Site security issues are: [4]
Corporate Espionage; Cross Site Scripting, Viruses &
Worms; Social Network Site Aggregators; Spear
Phishing & Social Network specific Phishing;
Infiltration of Networks Leading to data leakage; I.D.
Theft; Bullying; Digital Dossier Aggregation
Vulnerabilities; Secondary Data Collection
Vulnerabilities; Face Recognition Vulnerabilities;
CBIR (Content-based Image Retrieval); Difficulty of
Complete Account Deletion; Spam; and Stalking.
2. Case Studies
There are many criminal activities arising from the
use of social network sites. For example, a mother
was convicted of computer fraud for her involvement
in creating a phony account on MySpace to trick a
teenager, who later committed suicide [15]. The
tools found in thi ...
Basic tips for staying safe and protecting personal privacy on popular social media sites, including Facebook, Twitter, and Instagram. Designed for casual users of social media.
This slide provides details about cyber security as following;
what is cyber security or computer security?
why cyber security is important?
what is cyber crime?
cyber security problems,
how to prevent from cyber crime?
global scenario of cyber crime?
organisation in world for cyber security,
top companies in cyber security,
career choice in cyber security,
scope of cyber security.
Cyber Security introduction. Cyber security definition. Vulnerabilities. Social engineering and human error. Financial cost of security breaches. Computer protection. The cyber security job market
This is a summary of what cyber crime is all about, the history of cyber crime; motivation behind cyber attack as well as the various techniques used in committing those crimes; Cybercrime groups starting to operate like the Mafia; how cyber crimes exploits Web2.0 opportunites and Top Computer Secuity Actions.
This presentation gives an overview of various security issues in mobile phones having different operating systems. Ways to avoid spamming and malware in our mobile phones are also presented.
Security challenges of smart phone & mobile device
Visualizing mobile security
Attacks moving to mobile – why?
What your phone knows & what it shares
Smart phone & mobile device the threats
Countermeasures
Mobile security best practices
You've seen the headlines. You're beginning to understand the importance of cybersecurity. Where do you begin? It's important to understand the common methods of attack and ways you can begin to protect your organization today. For more information on our cybersecurity education please visit FPOV.com/edu.
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
A4.1
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2009
Forensics Tools for Social Network Security
Solution
s
Janet Cheng, Jennifer Hoffman, Therese LaMarche, Ahmet Tavil, Amit Yavad, and Steve Kim
Seidenberg School of CSIS, Pace University, White Plains, NY 10606, USA
Abstract
The usage of Social Network Sites has increased
rapidly in recent years. Since the success of a Social
Network Site depends on the number of users it
attracts, there is pressure on providers of Social
Network sites to design systems that encourage
behavior which increases both the number of users
and their connections. However, like any fast-
growing technology, security has not been a high
priority in the development of Social Network Sites.
As a result, along with the benefits of Social Network
Sites, significant security risks have resulted.
Providing Social Network Site users with tools which
will help protect them is ideal. Tools are developed
for installation on a user’s computer to provide them
the ability to retrieve other online user information
via chat and social network websites. These tools will
also benefit law enforcement agents when crimes are
committed.
1. Introduction
This paper analyzes and extends the forensic tools
developed in an earlier study for protecting Social
Network Site users from security threats [14]. First,
we will identify the security issues found in Social
Network Sites. Second, we will demonstrate how our
tools can provide users with more information which
we hope will help prevent them from becoming
victims. Finally, if a crime has been committed, we
will detail the tools available to assist in
apprehending the perpetrator.
The tools we developed retrieve Social Network Site
user’s non-personal-identifiable information, such as
IP address, operating system, browser type, etc.
Retrieval of this information occurs upon the virtual
contact from that other person, be it by them simply
browsing our personal page, or by other person
contacting via Virtual Meeting, for example chatting.
This paper covers methodologies used, test results,
and future goals.
The Social Network Site security issues are: [4]
Corporate Espionage; Cross Site Scripting, Viruses &
Worms; Social Network Site Aggregators; Spear
Phishing & Social Network specific Phishing;
Infiltration of Networks Leading to data leakage; I.D.
Theft; Bullying; Digital Dossier Aggregation
Vulnerabilities; Secondary Data Collection
Vulnerabilities; Face Recognition Vulnerabilities;
CBIR (Content-based Image Retrieval); Difficulty of
Complete Account Deletion; Spam; and Stalking.
2. Case Studies
There are many criminal activities arising from the
use of social network sites. For example, a mother
was convicted of computer fraud for her involvement
in creating a phony account on MySpace to trick a
teenager, who later committed suicide [15]. The
tools found in thi ...
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks.Hendrik Speck
Professor Hendrik Speck - Social Conduct. Privacy and Social Networks, re:publica’09. Shift happens. Netiquette for Social Networks, April 2nd, 2009, Berlin, Germany
October 9th, 2008 Berlin, Germany, privacy, private sphere, public sphere, risk, law, security, anonymity, surveillance, panopticon, sousveillance, social network analysis, social media, web 2.0, hype, history, features, examples, audience, user, markets, revenues, google, youtube, myspace, wikipedia, captcha, security, cracking, data portability, decentralization, helloworld, hello world network, open id, openid, opensocial, open social, rsa, foaf, xml, java
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBsMichael Zimmer
Research Ethics in the 2.0 Era: New Challenges for Researchers and IRBs, University of Pittsburgh Institutional Review Board Educational Series, October 5, 2012
A Survey of Methods for Spotting Spammers on Twitterijtsrd
Social networking sites explosive expansion as a means of information sharing, management, communication, storage, and management has attracted hackers who abuse the Web to take advantage of security flaws for their own nefarious ends. Every day, forged internet accounts are compromised. Online social networks OSNs are rife with impersonators, phishers, scammers, and spammers who are difficult to spot. Users who send unsolicited communications to a large audience with the objective of advertising a product, entice victims to click on harmful links, or infect users systems only for financial gain are known as spammers. Many studies have been conducted to identify spam profiles in OSNs. In this essay, we have discussed the methods currently in use to identify spam Twitter users. User based, content based, or a combination of both features could be used to identify spammers. The current paper gives a summary of the traits, methodologies, detection rates, and restrictions if any for identifying spam profiles, primarily on Twitter. Hareesha Devi | Pankaj Verma | Ankit Dhiman "A Survey of Methods for Spotting Spammers on Twitter" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57439.pdf Paper URL: https://www.ijtsrd.com.com/computer-science/artificial-intelligence/57439/a-survey-of-methods-for-spotting-spammers-on-twitter/hareesha-devi
An IAC Approach for Detecting Profile Cloning in Online Social NetworksIJNSA Journal
Nowadays, Online Social Networks (OSNs) are popular websites on the internet, which millions of users register on and share their own personal information with others. Privacy threats and disclosing personal information are the most important concerns of OSNs’ users. Recently, a new attack which is named Identity Cloned Attack is detected on OSNs. In this attack the attacker tries to make a fake identity of a real user in order to access to private information of the users’ friends which they do not publish on the public profiles. In today OSNs, there are some verification services, but they are not active services and they are useful for users who are familiar with online identity issues. In this paper, Identity cloned attacks are explained in more details and a new and precise method to detect profile cloning in online social networks is proposed. In this method, first, the social network is shown in a form of graph, then, according to similarities among users, this graph is divided into smaller communities. Afterwards, all of the similar profiles to the real profile are gathered (from the same community), then strength of relationship (among all selected profiles and the real profile) is calculated, and those which have the less strength of relationship will be verified by mutual friend system. In this study, in order to evaluate the effectiveness of proposed method, all steps are applied on a dataset of Facebook, and finally this work is compared with two previous works by applying them on the dataset.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
This presentation discusses Ethics considerations for Corpus Linguistics studies using internet resources. The talk was given at the Corpus Linguistics 2015 conference at Lancaster, UK (July 21-24, 2015).
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Lar...Hendrik Speck
Professor Hendrik Speck - Social and Virtual. - An Analysis Framework for Large Scale Communities. Commercial Communities Conference. Technical University of Berlin. Institute of Sociology, October 30 - 31 2008, Berlin, Germany, User Generated Content, Interaction, Third Party Associations and Content, Access and Connectivity, API's, Beacons, and Data Feeds, Merger of Social, Mobile and Local, social network analysis, social network visualization, Audience and Participants, Relational Data, Mathematical Models, Analytical Framework, Processing, Computing Power, Computer Mediated Communication, Visualization Algorithms, Interest, Use Cases, Marketing, Commerce, Web Services, Type of Data, Attribute, Ideational, Relational, Research Method, Survey Research, Surveys and Interviews, Ethographic Research, Observations, Field Studies, Documentary Research
Logfiles, Texts and Archives, Type of Analysis, Variable, Typological, Network, User Profiles. Name, Age, Links, Interests, Hobbies, City, Country, Category, Videos Headline, Content, Descriptions, Tags, Playlists, Video Comments Author, Text, Tags, Themes, Ranking of Users and Channels Views or Subscriptions by Time and Category, Rankings of Videos Ratings or Views by Time and Category, Interaction Friends, Subscription, Comments, FollowUps
Betweenness, Centrality Closeness, Centrality Degree, Flow Betweenness Centrality, Centrality Eigenvector, Centralization, Clustering Coefficient, Cohesion, Contagion, Density, Integration, Path Length, Radiality, Reach, Structural Equivalence, Structural Hole, Islands
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
2. Personal Social Networks
Status Update Social Networks
Location Social Networks
Content Sharing Social Networks
Shared Interest Social Networks
2
14. Customize user profile data
Link previews
Private messaging
HTTPS secured Twitter browsing
14
15. 2013
250,000 users
Limited user information
User names
Email Addresses
Sessions tokens
Encrypted versions of passwords
15
16. [1] Wajeb Gharibi, Maha Shaabi, “Cyber Threats in Social Websites”, College of
Computer Science & Information Systems Jazan University, Kingdom of Saudi Arabia
[2] Joseph Bonneau, “Security & Privacy in Online Social Networks” University of
Cambridge, Computer Laboratory
[3] William F. Pelgrin, “Security and Privacy on Social Networking Sites”, Multi-State
Information Sharing & Analysis Center (MS-ISAC) Monthly Security Tips
NEWSLETTER, March 2010
[4] Dr. Paul Judge, Chief Research Officer, “2011 Social Networking Security and
Privacy Study”, Barracuda Networks Inc.
[5] George Danezis, “Inferring Privacy Policies for Social Networking Services”
Microsoft Research, Cambridge,
[6] Dolvara Gunatilaka, “A Survey of Privacy and Security Issues in Social Networks”
(http://www.cse.wustl.edu)
[7] Aaron Beach, Mike Gartrell, Richard Han “Solutions to Security and Privacy Issues
in Mobile Social Networking” University of Colorado at Boulder
[8] Catherine Dwyer; Pace University, Starr Roxanne Hiltz ;New Jersey Institute of
Technology, Katia Passerini ;New Jersey Institute of Technology, “Trust and privacy
concern within social networking sites: A comparison of Facebook and MySpace”
[9] “Social Networks Overview: Current Trends and Research
Challenges”, Coordinated by the “nextMEDIA” CSA. Supported by the Future Media
Networks cluster. NEXT-Media is supported by FP7, DG Information Society, Unit D2
Networked Media
16