61,543 research outputs found

    A two-layer security model for accessing multimedia content in social networks

    Get PDF
    La seguridad de un sitio web es hoy en día una de las principales preocupaciones de los administradores de sistemas. La seguridad es también el reto más importante al que se enfrentan los desarrolladores web a la hora de diseñar una plataforma fiable que ofrezca servicios a los usuarios públicos. Es bien sabido que el contenido multimedia en la web está en continuo crecimiento y, recientemente, este tipo de medios se utiliza cada vez más en las redes sociales. El acceso a los contenidos multimedia en el contexto de las redes sociales debe ser fácil y seguro. En este artículo se presenta un modelo de seguridad con capacidad semántica para el acceso a contenidos multimedia en las redes sociales. La aplicación de este modelo garantiza que (1) los usuarios no autorizados no puedan acceder a los datos multimedia privados, y (2) se mejore el nivel general de confianza entre los usuarios de las redes sociales que comparten sus datos privados y sensibles. Se desarrollaron dos cuestionarios para seleccionar los rasgos más característicos que se deben considerar en nuestro modelo para diferenciar a los usuarios legítimos de los atacantes. Mediante el uso de consideraciones paramétricas, se alcanza tanto la seguridad como la comodidad de los usuarios, lo que hace que nuestro modelo propuesto sea más eficaz.RACHEL TEC2013-47141-C4-4-RSecuring a website is nowadays one of the major concerns for system administrators. Security is also the most important challenge that Web developers have to face when designing a trustworthy platform to provide services for public users. It is well known that multimedia content on the Web is continuously growing and recently this media type is more and more commonly used in social networks. The access to multimedia content in the context of social networks should be both easy and secure. In this paper, a semantically-empowered security model for accessing multimedia content in social networks is presented. The application of this model ensures that (1) unauthorized users cannot access to private multimedia data, and (2) the overall level of trust among social networks users who share their private and sensitive data is enhanced. Two questionnaires were developed to select the most characteristic features to consider in our model to differentiate legitimate users and attackers. By using parametric considerations, both security and users’ convenience are reached which makes our proposed model more effective

    Quality of Information in Mobile Crowdsensing: Survey and Research Challenges

    Full text link
    Smartphones have become the most pervasive devices in people's lives, and are clearly transforming the way we live and perceive technology. Today's smartphones benefit from almost ubiquitous Internet connectivity and come equipped with a plethora of inexpensive yet powerful embedded sensors, such as accelerometer, gyroscope, microphone, and camera. This unique combination has enabled revolutionary applications based on the mobile crowdsensing paradigm, such as real-time road traffic monitoring, air and noise pollution, crime control, and wildlife monitoring, just to name a few. Differently from prior sensing paradigms, humans are now the primary actors of the sensing process, since they become fundamental in retrieving reliable and up-to-date information about the event being monitored. As humans may behave unreliably or maliciously, assessing and guaranteeing Quality of Information (QoI) becomes more important than ever. In this paper, we provide a new framework for defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the current state-of-the-art on the topic. We also outline novel research challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN

    Multimodal Content Analysis for Effective Advertisements on YouTube

    Full text link
    The rapid advances in e-commerce and Web 2.0 technologies have greatly increased the impact of commercial advertisements on the general public. As a key enabling technology, a multitude of recommender systems exists which analyzes user features and browsing patterns to recommend appealing advertisements to users. In this work, we seek to study the characteristics or attributes that characterize an effective advertisement and recommend a useful set of features to aid the designing and production processes of commercial advertisements. We analyze the temporal patterns from multimedia content of advertisement videos including auditory, visual and textual components, and study their individual roles and synergies in the success of an advertisement. The objective of this work is then to measure the effectiveness of an advertisement, and to recommend a useful set of features to advertisement designers to make it more successful and approachable to users. Our proposed framework employs the signal processing technique of cross modality feature learning where data streams from different components are employed to train separate neural network models and are then fused together to learn a shared representation. Subsequently, a neural network model trained on this joint feature embedding representation is utilized as a classifier to predict advertisement effectiveness. We validate our approach using subjective ratings from a dedicated user study, the sentiment strength of online viewer comments, and a viewer opinion metric of the ratio of the Likes and Views received by each advertisement from an online platform.Comment: 11 pages, 5 figures, ICDM 201

    Trust and Control Dynamics in Agrifood Supply Networks: Communication Strategies for Electronic Transaction Environments

    Get PDF
    Agrifood supply networks are dynamic structures where firms regularly face the need to search for new market partners. A decision for a transaction with a new partner requires the existence of appropriate control and safeguard mechanisms as well as trust to overcome perceived risk and uncertainties. Electronic transaction environments offer new potentials for the identification of new transaction partners. However, trust and control need to be communicated appropriately in electronic transaction environments for agrifood supply network scenarios. Problems for appropriate communication are posed by the complex interrelation between trust and control in transaction processes and their dynamically changing importance in a transaction relation. This paper contributes to the development of appropriate trust and control communication strategies in e-commerce as it analyzes the occurrence of trust and control elements in the phases of a transaction in the agrifood sector.Agricultural Markets Marketing, Marketing, Technological Change, Social Norms, Social Capital, e-Commerce, Industrial Organization, Marketing, Q13, O3, Z13, L81,
    corecore