• No results found

[PDF] Top 20 Vulnerability to social engineering in social networks : a proposed user-centric framework

Has 10000 "Vulnerability to social engineering in social networks : a proposed user-centric framework" found on our website. Below are the top 20 most common "Vulnerability to social engineering in social networks : a proposed user-centric framework".

Vulnerability to social engineering in social networks : a proposed user-centric framework

Vulnerability to social engineering in social networks : a proposed user-centric framework

... Abstract— Social networking sites have billions of users who communicate and share their personal information every ...day. Social engineering is considered one of the biggest threats to information ... See full document

6

Predicting individuals' vulnerability to social engineering in social networks

Predicting individuals' vulnerability to social engineering in social networks

... online user behav- ...in social networks such as entertainment or information seeking (Basak and Calisir ...for social reasons such as maintaining existing relationships and making new friends ... See full document

19

User characteristics that influence judgment of social engineering attacks in social networks

User characteristics that influence judgment of social engineering attacks in social networks

... four proposed per- spectives, the considered population’s ability to deal with cyber-attacks can be ...indicates vulnerability to exploitation in the perceptual perspective of those ...the proposed ... See full document

24

Spiralling out of control? Online vulnerability in ego-centric networks

Spiralling out of control? Online vulnerability in ego-centric networks

... theoretical framework, which suggests that individuals perceive mass communication media to have a greater effect on others than on themselves (Davison, ...SNS user age and perceived vulnerability to ... See full document

474

Consumer-centric protection for online social networks

Consumer-centric protection for online social networks

... have proposed a framework in this paper. The COP framework is implemented as a web browser add-on that in- tercepts users’ actions and if required, enforces the privacy ...posed framework ... See full document

6

The Role of User Psychological Contracts in the Sustainability of Social Networks

The Role of User Psychological Contracts in the Sustainability of Social Networks

... our framework. Facebook, the largest online social network, has experienced some of the most significant and visible examples of psychological contract breaches between an SNS provider and its ...the ... See full document

32

Privacy Preserving User Data Publication In Social Networks

Privacy Preserving User Data Publication In Social Networks

... PMSN is a network of finding many friends with the least connections and thereby reducing the information exchange. Therefore, identifying the user nodes with the highest impact is a crucial first step. However, ... See full document

122

AN EFFICIENT FRAMEWORK FOR PROTECTING SENSITIVE DATA IN SOCIAL NETWORKS

AN EFFICIENT FRAMEWORK FOR PROTECTING SENSITIVE DATA IN SOCIAL NETWORKS

... have proposed is to make proper group of nodes, and suitable modification of labels of neighbor nodes of every group will satisfy the l-sensitive-label-diversity ... See full document

5

A Secure Framework for Multimedia Protection in Social Media Networks

A Secure Framework for Multimedia Protection in Social Media Networks

... worldwide. Social Media Networks (SMN) such as Flickr, YouTube, and Facebook allow millions of users to share their personal information and multimedia content with relatives, friends and other online ... See full document

5

Unique User Identification across Multiple Social Networks

Unique User Identification across Multiple Social Networks

... In proposed System, User can view his buddies who are online re supplement social networking sites in a single integrated ...swing social networking ...oscillate social networking ... See full document

6

USER GROUP ESTIMATION AND RECOMMENDATION MODEL FOR SOCIAL NETWORKS

USER GROUP ESTIMATION AND RECOMMENDATION MODEL FOR SOCIAL NETWORKS

... members. User and check-in venue details are used to cluster users with different preferences and interests into different ...process. User-venue similarity and venue-user similarity are the inter ... See full document

6

Social Engineering and Defense against Social Engineering

Social Engineering and Defense against Social Engineering

... of social engineering: human- based and technology ...human-based social engineering requires a man to-individual communication to accomplish a ...based social engineering ... See full document

5

An Empirical Test of the Social Media User Typology Framework

An Empirical Test of the Social Media User Typology Framework

... between social media user types on a host of independent variables. User types were based on the Media-User Typology which explicates user types into five categories based on their ... See full document

8

A Framework for Opportunistic Networking in Spontaneous and Ephemeral Social Networks

A Framework for Opportunistic Networking in Spontaneous and Ephemeral Social Networks

... It cannot be assumed that there is a common addressing scheme in a macronet nor that messages can be transmitted directly be- tween the devices of a macronet, even in the case of a Bluetooth scatternet. So, an upper ... See full document

5

A Collaborative Access Control Framework for Online Social Networks

A Collaborative Access Control Framework for Online Social Networks

... Online social networks (OSNs) are one of the most popular web-based services for people to communicate and share information with each ...a user posts a data item that involves other users, some ... See full document

72

Return on Investment For Social Media:  A Proposed Framework For Understanding, Implementing, And Measuring The Return

Return on Investment For Social Media: A Proposed Framework For Understanding, Implementing, And Measuring The Return

... companies, user communities and others to engage each other. Social Media (SM) platforms ...micro-blogs, social networks, video/photo upload sites), in particular, comprise a flourishing new ... See full document

14

Savant: An Accounting and Accountability Framework for Information Centric Networks

Savant: An Accounting and Accountability Framework for Information Centric Networks

... The primary objective of the ICN paradigm is to identify the limitations of the current Inter- net architecture and propose solutions for the future Internet [Xylomenos et al., 2014]. These limitations include [Xu et ... See full document

205

A Multidimensional Analysis of Social Vulnerability

A Multidimensional Analysis of Social Vulnerability

... of social vulnerability, for its diminishment the Government of Romania adopted a series of measures in view of solving some socio-cultural, housing, health, employment, education and birth increase issues, ... See full document

10

NYSOL: A User-Centric Framework for Knowledge Discovery in Big Data

NYSOL: A User-Centric Framework for Knowledge Discovery in Big Data

... This framework empowers operations staff to customize a simple yet highly functional system to accumulate of all information from its business processes and ... See full document

5

Managing social engineering risk: making social engineering transparant

Managing social engineering risk: making social engineering transparant

... the social engineering risk among the organizations employees and their (personal) responsibility in protecting the organization’s ...by social engineers and the targeted information (and value ... See full document

130

Show all 10000 documents...