2,517 research outputs found

    Major Security Issue That Facing Social Networks with Its Main Defense Strategies

    Get PDF
    The Social Network Service "SNS" has enabled significant advancements in a wide variety of scientific fields, and as a result, it has become an extremely popular subject in both academia and business. SNSs can be extremely beneficial to users because they eliminate economic and geographical barriers and can be used for job searching, entertainment and education. Regardless of the economic and social benefits, protecting businesses and users\u27 security and privacy remains a critical issue that must be addressed. It is critical to address and evaluate social network service challenges, as they vary according to the variety of SNS sites. Thus, by discussing SNS challenges alongside available and potential solutions, users, developers, and businesses can identify relevant and timely responses to specific threats, resulting in the best SNS-based services possible. The objective of this article is to discuss the inherent challenges of social networking sites and some critical solutions for resolving them. We extracted and analyzed seminal papers to add to the corpus of literature by focusing on several critical challenges in the social network service domain and shedding light on how these challenges affect a variety of domains, including users, sites, and business. The most frequently mentioned difficulties concerned privacy risks, anonymity risks, malware, spam, identity theft, phishing, business data, social content, technical issues, and psychological difficulties. By incorporating previously discovered solutions, this paper addressed these issues. The implications for both researchers and practitioners have been discussed

    Privacy Intelligence: A Survey on Image Sharing on Online Social Networks

    Full text link
    Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also led to an increased risk of privacy invasion. The recent image leaks from popular OSN services and the abuse of personal photos using advanced algorithms (e.g. DeepFake) have prompted the public to rethink individual privacy needs when sharing images on OSNs. However, OSN image sharing itself is relatively complicated, and systems currently in place to manage privacy in practice are labor-intensive yet fail to provide personalized, accurate and flexible privacy protection. As a result, an more intelligent environment for privacy-friendly OSN image sharing is in demand. To fill the gap, we contribute a systematic survey of 'privacy intelligence' solutions that target modern privacy issues related to OSN image sharing. Specifically, we present a high-level analysis framework based on the entire lifecycle of OSN image sharing to address the various privacy issues and solutions facing this interdisciplinary field. The framework is divided into three main stages: local management, online management and social experience. At each stage, we identify typical sharing-related user behaviors, the privacy issues generated by those behaviors, and review representative intelligent solutions. The resulting analysis describes an intelligent privacy-enhancing chain for closed-loop privacy management. We also discuss the challenges and future directions existing at each stage, as well as in publicly available datasets.Comment: 32 pages, 9 figures. Under revie

    Cyber Security Concerns in Social Networking Service

    Get PDF
    Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats

    Data Politics

    Get PDF
    Data has become a social and political issue because of its capacity to reconfigure relationships between states, subjects, and citizens. This book explores how data has acquired such an important capacity and examines how critical interventions in its uses in both theory and practice are possible. Data and politics are now inseparable: data is not only shaping our social relations, preferences and life chances but our very democracies. Expert international contributors consider political questions about data and the ways it provokes subjects to govern themselves by making rights claims. Concerned with the things (infrastructures of servers, devices, and cables) and language (code, programming, and algorithms) that make up cyberspace, this book demonstrates that without understanding these conditions of possibility it is impossible to intervene in or to shape data politics. Aimed at academics and postgraduate students interested in political aspects of data, this volume will also be of interest to experts in the fields of internet studies, international studies, Big Data, digital social sciences and humanities

    DIY John Curtin: Uncertain futures for heritage and citizenship in the era of digital friends and foes

    Get PDF
    This article introduces some of the problems confronting the popularization of national, civic and cultural heritage in the era of complex digital systems and social networks. Taking contemporary knowledge of John Curtin (Australia’s wartime PM) as its point of departure, the discussion explores some of the broader transformations of the conditions of citizenship, communication, heritage and knowledge production, and considers their implications for civic education and the uses of archives. In a novel thought experiment, the article explores some ways in which the figure of ‘John Curtin’ may be repurposed and reinvented for a new kind of DIY civic education based on user-led innovation

    Documenting and Assessing Learning in Informal and Media-Rich Environments

    Get PDF
    An extensive review of the literature on learning assessment in informal settings, expert discussion of key issues, and a new model for good assessment practice. Today educational activities take place not only in school but also in after-school programs, community centers, museums, and online communities and forums. The success and expansion of these out-of-school initiatives depends on our ability to document and assess what works and what doesn't in informal learning, but learning outcomes in these settings are often unpredictable. Goals are open-ended; participation is voluntary; and relationships, means, and ends are complex. This report charts the state of the art for learning assessment in informal settings, offering an extensive review of the literature, expert discussion on key topics, a suggested model for comprehensive assessment, and recommendations for good assessment practices.Drawing on analysis of the literature and expert opinion, the proposed model, the Outcomes-by-Levels Model for Documentation and Assessment, identifies at least ten types of valued outcomes, to be assessed in terms of learning at the project, group, and individual levels. The cases described in the literature under review, which range from promoting girls' identification with STEM practices to providing online resources for learning programming and networking, illustrate the usefulness of the assessment model

    Theories of Open Access

    Get PDF
    This article is an acknowledgement of the gap and frustrations created by a legal regime, which has provided the requisite legal covering for the exclusion of the generality from access to knowledge. It provides a theoretical analysis of open access from a multi-dimensional perspective inclusive of socio-economic, legal and political dimensions and explores the rationale for providing free, immediate, open and unrestricted access to the output of research. It seeks to identify and demonstrate the potential benefits of the open access movement to national and global development.

    Counter-Dancing Digitality: On Commoning and Computation

    Get PDF
    Digitality is imposed upon us! To change this, we should not turn away from it, but look carefully into its transformative power and make operable alternatives such as counter-algorhythms and solidarity-oriented commoning. The aim is a world where profit and property no longer exist, but instead where a cooperative dance - between all the needs posed by our ecosystems, and all the needs of people - becomes practicable. This book is a critical media theory of future-building, modulated by a focus on the potentials of counter-dancing as providing ways to unfold fugitive practices
    corecore