The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents some preliminary work on detecting sex offenders who might register in social networks under assumed identities using data mining, string matching, and weight-biased scoring.
Snowden's whistleblower from the last year made people more aware of the fact that we are living in the Internet surveillance era. Privacy of Internet communication has been disrupted. In this paper, application for privacy protection in chat communication, named CryptoCloak, is presented. CryptoCloak provides privacy protection for chat communication. Encrypted communication is masked with dynamic...
Online social network graphs provide useful insights on various social phenomena such as information dissemination and epidemiology. Unfortunately, social network providers often refuse to publish their social network graphs due to privacy concerns. Recently, differential privacy has become the widely accepted criteria for privacy preserving data publishing because it provides strongest privacy guarantees...
In the last decades, Online Social Networks (OSN) has become the most convenient and preferable means of communication between people regardless of age, culture, educational background or job title. The fast development of online social networks OSNs in turn gives rise to certain privacy risk and concerns towards the safety of using the OSNs for the disclosure of some personal data. In this work,...
With the widespread adoption of Online Social Networks (OSNs), users increasingly also use corresponding third-party applications (TPAs), such as social games and applications for collaboration. To improve their social experience, TPAs access users' personal data via an API provided by the OSN. Applications are then expected to comply with certain security and privacy policies when handling the users'...
Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members.
In this paper, we warn social network users about the threat that their profiles can easily be rebuilt from information disseminated on the Internet. The micro-blogging site Twitter is supposed to retain less personal information than sites like Facebook. Despite this, is it possible to reconstruct Twitter user profiles solely from publicly available information? We propose a new system based on a...
Considerable research in the field of Intelligent Tutoring Systems (ITS) has focused on helping students increase learning by taking advantage of technological progress. As the use of social media by learners continues to increase, however, ITS should go beyond teaching based on isolated environments (platforms) and turn toward community-based learning within social networks. In this paper we introduce...
Identity theft has become one of the fastest growing crimes. Most people are unaware of the amount of data they disclose over all the Internet services proposed by search engines, social networking sites, e-commerce web sites, free online tools, etc. They are also unaware that this data can be easily aggregated, data-mined and linked together, which may lead to a potential identity theft should it...
This paper proposes that social network data should be assumed public but treated private. Assuming this rather confusing requirement means that anonymity models such as k-anonymity cannot be applied to the most common form of private data release on the internet, social network APIs. An alternative anonymity model, q-Anon, is presented, which measures the probability of an attacker logically deducing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.