최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기Future internet, v.10 no.12, 2018년, pp.114 -
Ali, Shaukat (Department of Computer Science, Islamia College University, Peshawar 25120, Pakistan) , Islam, Naveed (Department of Computer Science, Islamia College University, Peshawar 25120, Pakistan) , Rauf, Azhar (Department of Computer Science, University of Peshawar, Peshawar 25120, Pakistan) , Din, Ikram Ud (Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan) , Guizani, Mohsen (Computer Science and Engineering Department, Qatar University, Doha 2713, Qatar) , Rodrigues, Joel J. P. C. (Post-graduation, National Institute of Telecommunications (Inatel), 37540-000 Santa Rita do Sapucaí)
The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN ha...
Boyd Social network sites: Definition, history, and scholarship J. Comput.-Mediat. Commun. 2007 10.1111/j.1083-6101.2007.00393.x 13 210
Obar Social media definition and the governance challenge: An introduction to the special issue Telecommun. Policy 2015 10.1016/j.telpol.2015.07.014 39 745
Kaplan Users of the world, unite! The challenges and opportunities of Social Media Bus. Horiz. 2010 10.1016/j.bushor.2009.09.003 53 59
Nissenbaum Privacy as Contextual Integrity Wash. L. Rev. 2004 79 101
Davison To Screen or Not to Screen? Using the Internet for Selection Decisions Empl. Responsib. Rights J. 2012 10.1007/s10672-011-9178-y 24 1
Taddicken The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure J. Comput.-Mediat. Commun. 2014 10.1111/jcc4.12052 19 248
Marwick Networked privacy: How teenagers negotiate context in social media New Media Soci. 2014 10.1177/1461444814543995 16 1051
Ashtari I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy J. Inf. Priv. Secur. 2013 9 80
Fire Online social networks: Threats and solutions IEEE Commun. Surv. Tutor. 2014 10.1109/COMST.2014.2321628 16 2019
Heymann Fighting spam on social web sites: A survey of approaches and future challenges IEEE Internet Comput. 2007 10.1109/MIC.2007.125 11 36
Everett Social media: Opportunity or risk? Comput. Fraud Secur. 2010 2010 8
Nithya A survey on detection and prevention of cross-site scripting attack Int. J. Secur. Appl. 2015 9 139
Baltazar, J., Costoya, J., and Flores, R. (2018, October 21). The Real Face of Koobface: The Largest Web 2.0 Botnet Explained. Available online: https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-real-face-of-koobface.pdf.
Protalinski, E. (2018, October 21). Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online: https://www.zdnet.com/article/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/.
Dvorak, J.C. (2018, November 01). LinkedIn Account Hacked. Available online: https://www.pcmag.com/article2/0,2817,2375983,00.asp.
Miller, S. (2018, November 01). Sen. Grassley’s Twitter Account Hacked by SOPA Protesters. Available online: https://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/.
Vishwanath Getting phished on social media Decis. Support Syst. 2017 10.1016/j.dss.2017.09.004 103 70
Fire Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies Human J. 2012 1 26
Egele Towards detecting compromised accounts on social networks IEEE Trans. Dependable Secure Comput. 2017 10.1109/TDSC.2015.2479616 14 447
Gao, H., Chen, Y., Lee, K., Palsetia, D., and Choudhary, A.N. (2012, January 5-8). Towards Online Spam Filtering in Social Networks. Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, USA.
Gupta Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art Int. J. Syst. Assur. Eng. Manag. 2017 10.1007/s13198-015-0376-0 8 512
Faghani A study of XSS worm propagation and detection mechanisms in online social networks IEEE Trans. Inf. Forensics Secur. 2013 10.1109/TIFS.2013.2280884 8 1815
Lundeen, R., Ou, J., and Rhodes, T. (2018, November 01). New Ways Im Going to Hack Your Web APP. Available online: https://www.blackhat.com/html/bh-ad-11/bh-ad-11-archives.htmlLundeen.
Wani, M.A., Jabin, S., and Ahmad, N. (2018, October 29). A sneak into the Devil’s Colony-Fake Profiles in Online Social Networks. Available online: https://arxiv.org/ftp/arxiv/papers/1705/1705.09929.pdf.
Perlroth, N. (2018, November 01). Fake Twitter Followers Become Multimillion-Dollar Business. Available online: https://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimillion-dollar-business/?_php=true&_type=blogs&ref=technology&_r=0.
Lewis, J. (The Telegraph, 2012). How spies used Facebook to Steal NATO Chief’s Details, The Telegraph.
Heatherly Preventing private information inference attacks on social networks IEEE Trans. Knowl. Data Eng. 2013 10.1109/TKDE.2012.120 25 1849
Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B., and Mislove, A. (2014, January 20-22). Towards Detecting Anomalous User Behavior in Online Social Networks. Proceedings of the USENIX Security Symposium, San Diego, CA, USA.
Torabi, S., and Beznosov, K. (2013, January 12). Privacy Aspects of Health Related Information Sharing in Online Social Networks. Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA.
Scism, L., and Maremont, M. (The Wall Street Journal, 2010). Insurers Test Data Profiles to Identify Risky Clients, The Wall Street Journal.
Humphreys Mobile social networks and social practice: A case study of Dodgeball J. Comput.-Mediat. Commun. 2007 10.1111/j.1083-6101.2007.00399.x 13 341
Doyle A study on cyberstalking: Understanding investigative hurdles FBI Law Enforc. Bull. 2003 72 10
Ali User Profiling: A Privacy Issue in Online Public Network Sindh Univ. Res. J. (Sci. Seri.) 2017 49 125
Fuchs Towards a theoretical model of social media surveillance in contemporary society Commun. Eur. J. Commun. Res. 2015 40 113
Zhang, W., and Al Amin, H. (2015, January 9-11). Privacy and security concern of online social networks from user perspective. Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP2015), ESEO, Angers, Loire Valley, France.
Carminati Semantic web-based social network access control Comput. Secur. 2011 10.1016/j.cose.2010.08.003 30 108
Miltgen Cultural and generational influences on privacy concerns: A qualitative study in seven European countries Eur. J. Inf. Syst. 2014 10.1057/ejis.2013.17 23 103
Fletcher, D. (2018, November 10). How Facebook Is Redefining Privacy. Available online: http://content.time.com/time/magazine/article/0,9171,1990798,00.html.
Penni The future of online social networks (OSN): A measurement analysis using social media tools and application Telemat. Inform. 2017 10.1016/j.tele.2016.10.009 34 498
Boshmaf Design and analysis of a social botnet Comput. Netw. 2013 10.1016/j.comnet.2012.06.006 57 556
Makridakis Understanding the behavior of malicious applications in social networks IEEE Netw. 2010 10.1109/MNET.2010.5578913 24 14
Tam The evolution of android malware and android analysis techniques ACM Comput. Surv. 2017 10.1145/3017427 49 76
Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. (2007, January 10). The Ghost in the Browser: Analysis of Web-based Malware. Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots’07), Cambridge, MA, USA.
10.1007/978-3-319-04918-2_23 Chaabane, A., Ding, Y., Dey, R., Kaafar, M.A., and Ross, K.W. (2014, January 10-11). A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?. Proceedings of the 15th International Conference on Passive and Active Network Measurement, Los Angeles, CA, USA.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
오픈액세스 학술지에 출판된 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.