Analysis and detection of fake profile over social network

V Tiwari - 2017 International Conference on Computing …, 2017‏ - ieeexplore.ieee.org
Latest developments have seen exponential increase in clientele of social networks.
Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily …

Uncanny valley effects on friendship decisions in virtual social networking service

M Shin, SW Song, TM Chock - Cyberpsychology, Behavior, and …, 2019‏ - liebertpub.com
Drawing on the uncanny valley effects (UVE) hypothesis and related works on avatar-based
interactions, this study investigates the role of UVE (ie, a feeling of eeriness), induced by …

Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD)

J Ge, J Peng, Z Chen - 2014 ieee 13th international conference …, 2014‏ - ieeexplore.ieee.org
Surfing on the online social networks is becoming a daily experience of many modern
people. Many factors cause users to willingly share their privacy information in online social …

A secure and sustainable framework to mitigate hazardous activities in online social networks

MA Rahman, SMN Sadat, AT Asyhari… - IEEE Transactions …, 2019‏ - ieeexplore.ieee.org
Recent years have seen continuous exposure of online social network (OSN) users to the
security vulnerability due to socio-technical cyber hazards committed by OSN associates …

Detecting unintentional information leakage in social media news comments

I Yahav, DG Schwartz… - Proceedings of the 2014 …, 2014‏ - ieeexplore.ieee.org
This paper is concerned with unintentional information leakage (UIL) through social
networks, and in particular, Facebook Organizations often use forms of self censorship in …

Data-flow assisted behavioral partitioning for embedded systems

S Agrawal, RK Gupta - Proceedings of the 34th Annual Design …, 1997‏ - dl.acm.org
In this paper we present a novel compiler-directed approach tosystem-level partitioning for a
given description of system functionalityin a hardware description language (HDL). The …

Publishing and sharing encrypted data with potential friends in online social networks

H Shuai, WT Zhu, X Liu - Security and Communication …, 2014‏ - Wiley Online Library
Making friends by publishing and sharing personal data in a special interest group has
become popular in online social networks. Data security is a major concern, as digital …

[PDF][PDF] The Relationship Between Boundary Permeability, Boundary Ownership, Boundary Linkages and Religiosity on Self-disclosure in Facebook among …

NHM Noor, NSM Nasir‏ - ipptar.gov.my
The meteoric rise in the popularity and functionality of social networking sites (SNSs) has
provided a new magnitude for social interaction and connection. Due to this expansion …

News censorship in social networks: A study of circumvention in the commentsphere

D Schwartz, G Silverman, I Yahav - Available at SSRN 2604910, 2015‏ - papers.ssrn.com
We study the interplay between online news, reader comments, and social networks, to
detect and characterize a new form of unintentional information leakage-the accidental …

[ספר][B] Friend Recommendation in Social Multimedia Networks

S Huang - 2017‏ - search.proquest.com
With the rapid development of computer science and internet technologies, social media
and social network has experienced explosive growth over the last decades. Social …