6 research outputs found
Recommended from our members
Vulnerability in online social network profiles. A Framework for Measuring Consequences of Information Disclosure in Online Social Networks.
The increase in online social network (OSN) usage has led to personal details
known as attributes being readily displayed in OSN profiles. This can lead to the
profile owners being vulnerable to privacy and social engineering attacks which
include identity theft, stalking and re identification by linking.
Due to a need to address privacy in OSNs, this thesis presents a framework to
quantify the vulnerability of a user¿s OSN profile. Vulnerability is defined as the
likelihood that the personal details displayed on an OSN profile will spread due
to the actions of the profile owner and their friends in regards to information
disclosure.
The vulnerability measure consists of three components. The individual
vulnerability is calculated by allocating weights to profile attribute values
disclosed and neighbourhood features which may contribute towards the
personal vulnerability of the profile user. The relative vulnerability is the
collective vulnerability of the profiles¿ friends. The absolute vulnerability is the
overall profile vulnerability which considers the individual and relative
vulnerabilities.
The first part of the framework details a data retrieval approach to extract
MySpace profile data to test the vulnerability algorithm using real cases. The
profile structure presented significant extraction problems because of the
dynamic nature of the OSN. Issues of the usability of a standard dataset
including ethical concerns are discussed. Application of the vulnerability
measure on extracted data emphasised how so called ¿private profiles¿ are not
immune to vulnerability issues. This is because some profile details can still be
displayed on private profiles.
The second part of the framework presents the normalisation of the measure, in
the context of a formal approach which includes the development of axioms and
validation of the measure but with a larger dataset of profiles. The axioms
highlight that changes in the presented list of profile attributes, and the
attributes¿ weights in making the profile vulnerable, affect the individual
vulnerability of a profile.
iii
Validation of the measure showed that vulnerability involving OSN profiles does occur and this provides a good basis for other researchers to build on the measure further. The novelty of this vulnerability measure is that it takes into account not just the attributes presented on each individual profile but features of the profiles¿ neighbourhood
Dancing to the Partisan Beat: A First Analysis of Political Communication on TikTok
TikTok is a video-sharing social networking service, whose popularity is
increasing rapidly. It was the world's second-most downloaded app in 2019.
Although the platform is known for having users posting videos of themselves
dancing, lip-syncing, or showcasing other talents, user-videos expressing
political views have seen a recent spurt. This study aims to perform a primary
evaluation of political communication on TikTok. We collect a set of US
partisan Republican and Democratic videos to investigate how users communicated
with each other about political issues. With the help of computer vision,
natural language processing, and statistical tools, we illustrate that
political communication on TikTok is much more interactive in comparison to
other social media platforms, with users combining multiple information
channels to spread their messages. We show that political communication takes
place in the form of communication trees since users generate branches of
responses to existing content. In terms of user demographics, we find that
users belonging to both the US parties are young and behave similarly on the
platform. However, Republican users generated more political content and their
videos received more responses; on the other hand, Democratic users engaged
significantly more in cross-partisan discussions.Comment: Accepted as a full paper at the 12th International ACM Web Science
Conference (WebSci 2020). Please cite the WebSci version; Second version
includes corrected typo
An initial exploration of ethical research practices regarding automated data extraction from online social media user profiles
The popularity of social media, especially online social networks, has led to the availability of potentially rich sources of data, which researchers can use for extraction via automated means. However, the process of automated extraction from user profiles results in a variety of ethical considerations and challenges for researchers. This paper examines this question further, surveying researchers to gain information regarding their experiences of, and thoughts about, the challenges to ethical research practices associated with automated extraction. Results indicated that, in comparison with two or three years ago researchers are more aware of ethical research practices, and are implementing them into their studies. However, areas such as informed consent suffer from a lack of implementation in research studies. This is due to various factors, such as social media ‘Terms of Service’, challenges with large volumes of data, how far to take informed consent, and the definition of online informed consent. Researchers face a range of issues from digital rights to clear guidance. This paper discusses the findings of the survey questionnaire and explores how the findings affect researchers
Guidelines for the use and interpretation of assays for monitoring autophagy (4th edition)
In 2008, we published the first set of guidelines for standardizing research in autophagy. Since then, this topic has received increasing attention, and many scientists have entered the field. Our knowledge base and relevant new technologies have also been expanding. Thus, it is important to formulate on a regular basis updated guidelines for monitoring autophagy in different organisms. Despite numerous reviews, there continues to be confusion regarding acceptable methods to evaluate autophagy, especially in multicellular eukaryotes. Here, we present a set of guidelines for investigators to select and interpret methods to examine autophagy and related processes, and for reviewers to provide realistic and reasonable critiques of reports that are focused on these processes. These guidelines are not meant to be a dogmatic set of rules, because the appropriateness of any assay largely depends on the question being asked and the system being used. Moreover, no individual assay is perfect for every situation, calling for the use of multiple techniques to properly monitor autophagy in each experimental setting. Finally, several core components of the autophagy machinery have been implicated in distinct autophagic processes (canonical and noncanonical autophagy), implying that genetic approaches to block autophagy should rely on targeting two or more autophagy-related genes that ideally participate in distinct steps of the pathway. Along similar lines, because multiple proteins involved in autophagy also regulate other cellular pathways including apoptosis, not all of them can be used as a specific marker for bona fide autophagic responses. Here, we critically discuss current methods of assessing autophagy and the information they can, or cannot, provide. Our ultimate goal is to encourage intellectual and technical innovation in the field