205 resultados para Social Network Sites
Resumo:
Detecting anomalies in the online social network is a significant task as it assists in revealing the useful and interesting information about the user behavior on the network. This paper proposes a rule-based hybrid method using graph theory, Fuzzy clustering and Fuzzy rules for modeling user relationships inherent in online-social-network and for identifying anomalies. Fuzzy C-Means clustering is used to cluster the data and Fuzzy inference engine is used to generate rules based on the cluster behavior. The proposed method is able to achieve improved accuracy for identifying anomalies in comparison to existing methods.
Resumo:
Social Engineering (ES) is now considered the great security threat to people and organizations. Ever since the existence of human beings, fraudulent and deceptive people have used social engineering tricks and tactics to trick victims into obeying them. There are a number of social engineering techniques that are used in information technology to compromise security defences and attack people or organizations such as phishing, identity theft, spamming, impersonation, and spaying. Recently, researchers have suggested that social networking sites (SNSs) are the most common source and best breeding grounds for exploiting the vulnerabilities of people and launching a variety of social engineering based attacks. However, the literature shows a lack of information about what types of social engineering threats exist on SNSs. This study is part of a project that attempts to predict a persons’ vulnerability to SE based on demographic factors. In this paper, we demonstrate the different types of social engineering based attacks that exist on SNSs, the purposes of these attacks, reasons why people fell (or did not fall) for these attacks, based on users’ opinions. A qualitative questionnaire-based survey was conducted to collect and analyse people’s experiences with social engineering tricks, deceptions, or attacks on SNSs.
Resumo:
Social networking sites (SNSs), with their large number of users and large information base, seem to be the perfect breeding ground for exploiting the vulnerabilities of people, who are considered the weakest link in security. Deceiving, persuading, or influencing people to provide information or to perform an action that will benefit the attacker is known as “social engineering.” Fraudulent and deceptive people use social engineering traps and tactics through SNSs to trick users into obeying them, accepting threats, and falling victim to various crimes such as phishing, sexual abuse, financial abuse, identity theft, and physical crime. Although organizations, researchers, and practitioners recognize the serious risks of social engineering, there is a severe lack of understanding and control of such threats. This may be partly due to the complexity of human behaviors in approaching, accepting, and failing to recognize social engineering tricks. This research aims to investigate the impact of source characteristics on users’ susceptibility to social engineering victimization in SNSs, particularly Facebook. Using grounded theory method, we develop a model that explains what and how source characteristics influence Facebook users to judge the attacker as credible.
Resumo:
Social Networks (SN) users have various privacy requirements to protect their information; to address this issue, a six-stage thematic analysis of scholarly articles related to SN user privacy concerns were synthesized. Then this research combines mixed methods research employing the strengths of quantitative and qualitative research to investigate general SN users, and thus construct a new set of ?ve primary and Twenty-?ve secondary SN user privacy requirements. Such an approach has been rarely used to examine the privacy requirements. Factor analysis results show superior agreement with theoretical predictions and signi?cant improvement over previous alternative models of SN user privacy requirements. This research presented here has the potential to provide for the development of more sophisticated privacy controls which will increase the ability of SN users to: specify their rights in SNs and to determine the protection of their own SN data.
Resumo:
Abstract: Social network technologies, as we know them today have become a popular feature of everyday life for many people. As their name suggests, their underlying premise is to enable people to connect with each other for a variety of purposes. These purposes however, are generally thought of in a positive fashion. Based on a multi-method study of two online environments, Habbo Hotel and Second Life, which incorporate social networking functionality, we she light on forms of what can be conceptualized as antisocial behaviours and the rationales for these. Such behaviours included: scamming, racist/homophobic attacks, sim attacks, avatar attacks, non-conformance to contextual norms, counterfeiting and unneighbourly behaviour. The rationales for sub behaviours included: profit, fun, status building, network disruption, accidental acts and prejudice. Through our analysis we are able to comment upon the difficulties of defining antisocial behaviour in such environments, particularly when such environments are subject to interpretation vis their use and expected norms. We also point to the problems we face in conducting our public and private lives given the role ICTs are playing in the convergence of these two spaces and also the convergence of ICTs themselves.
Resumo:
This thesis examines perceptions of advertising on social networking sites (SNS), in particular consumers' privacy concerns, advertising engagement and advertising avoidance. It contributes to the understanding of social media by providing results of a longitudinal investigation of consumer perceptions of advertising, a topography of engagement and avoidance triggers and a three dimensional model of advertising avoidance on SNS. This research used a mixed methodology, employing Critical Incident Technique, In-depth interviews and online surveys.
Resumo:
This paper presents two key findings from a longitudinal study examining the dynamics of social networks during organisational change. One, the degree to which users seek new sources of information while adapting to the change. Two, the degree to which social networks display structural resilience when undergoing significant structural and technological change. Users reported an increase in advice ties post-implementation, however a proportionally higher increase in ties within their work group compared to the wider network was identified. The results also supported the supposition that while IT driven change may initially disrupt social networks some networks possess a high degree of resilience, with key players reasserting their original positions of influence following the initial phase of change related disruption.
Resumo:
Understanding the dynamics of disease spread is essential in contexts such as estimating load on medical services, as well as risk assessment and interven- tion policies against large-scale epidemic outbreaks. However, most of the information is available after the outbreak itself, and preemptive assessment is far from trivial. Here, we report on an agent-based model developed to investigate such epidemic events in a stylised urban environment. For most diseases, infection of a new individual may occur from casual contact in crowds as well as from repeated interactions with social partners such as work colleagues or family members. Our model therefore accounts for these two phenomena. Given the scale of the system, efficient parallel computing is required. In this presentation, we focus on aspects related to paralllelisation for large networks generation and massively multi-agent simulations.
Resumo:
Ben Light puts forward an alternative way of thinking about how we engage with social networking sites, going beyond the emphasis upon connectivity that has been associated with research in the area to date. Analysing our engagements and disengagements social networking sites in public (in cafes and at bus stops), at work (at desks, photocopiers and whilst cleaning), in our personal lives (where we cull friends and gossip on backchannels) and as related to our health and wellbeing (where we restrict our updates), he emphasises the importance of disconnection instead of connection. The book produces a theory of disconnective practice. This theory requires our attention to geographies of disconnection that include relations with a site, within a site, between sites and between sites and a physical world. Attention to disconnectors, as human and non-human is required, and the modes by which disconnection can occur can then be revealed. Light argues that diversity in the exercise of power is key to understanding disconnective practice where social networking sites are concerned, and he suggests that the ethics of disconnection may also require interrogation.
Resumo:
This article conceptualises ‘participatory reluctance’ as a particular orientation to social media that problematises binarised notions of connection and disconnection in social networking sites. It qualitatively examines how the concept has functioned within gay men’s social networking service, Gaydar, among 18- to 28-year-old users of the site in Brisbane, Australia. Participatory reluctance is shown to be a central aspect of the culture of this space, fostered among the studied demographic by the convergence of the growing global push for marriage equality and increasing normalisation of the kinds of gay male identities commonly adopted among this group, with three key factors rooted primarily in Gaydar’s design: (1) young users’ perceptions of the site as a space for procuring casual sex; (2) their perceptions of the imagined user as embodying existing stereotypes of gay masculinity, and; (3) a lack of genuine alternatives in terms of niche digital spaces for gay men’s social networking.
Resumo:
Successful project management depends upon forming and maintaining relationships between and among project team members and stakeholder groups. The nature of these relationships and the patterns that they form affect communication, collaboration and resource flows. Networks affect us directly, and we use them to influence people and processes. Social Network Analysis (SNA) can be an extremely valuable research tool to better understand how critical social networks develop and influence work processes, particularly as projects become larger and more complex. This chapter introduces foundational network concepts, helps you determine if SNA could help you answer your research questions, and explains how to design and implement a social network study. At the end of this chapter, the reader can: understand foundational concepts about social networks; decide if SNA is an appropriate research methodology to address particular questions or problems; design and implement a basic social network study.
Resumo:
With the scope of Chinese diaspora in Australia, this paper theorises the impacts of digitally mediated social interaction on diasporic identity formation in the new media landscape. People’s identity is the outcome of their social interactions with other individuals. In the new media landscape, digital media technologies are changing the way in which people communicate with others. On one hand, space and time are unprecedentedly compressed by media technologies so people can maintain more frequent and instant connections with others than before. On the other hand, the digital media technologies have constructed a virtual social space that might withdraw people from their physical social interactions. As we witness today, our social interactions are increasing digitally mediated, in the forms of posts and comments in social network sites, as well as the messages in social apps. As to the diasporic groups, this new media landscape is presenting a challenge to their identity formation. They physically live in the host countries but still keep close social and cultural connections with their homelands. Facilitated by digital media technologies, they are facing two platforms in which they can practice different identity performances: one is the digitally mediated social network; the other is the physical social network. In the case of Chinese diaspora, the situation is more complex due to the language factor and media censorship in Mainland China, which will be articulated in the main text. This paper aims to fill a gap between media studies and diaspora research. Most of existing research on the relationship between diasporic identity and media primarily focuses on the development of ethnic media institutions, and the production and consumption of ethnic media in the pre-digital media context. However, the process of globalisation and digital media technologies are increasing the homogeneity and hybridity of media content worldwide. In this new context, attributing the formation of different identities to the consumption of media content is arguable to some extent. Therefore, the overlapped area of new media studies and diaspora research still has space deserves further investigation.
Resumo:
Past research has suggested that social engineering poses the most significant security risk. Recent studies have suggested that social networking sites (SNSs) are the most common source of social engineering attacks. The risk of social engineering attacks in SNSs is associated with the difficulty of making accurate judgments regarding source credibility in the virtual environment of SNSs. In this paper, we quantitatively investigate source credibility dimensions in terms of social engineering on Facebook, as well as the source characteristics that influence Facebook users to judge an attacker as credible, therefore making them susceptible to victimization. Moreover, in order to predict users’ susceptibility to social engineering victimization based on their demographics, we investigate the effectiveness of source characteristics on different demographic groups by measuring the consent intentions and behavior responses of users to social engineering requests using a role-play experiment.