A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
MoP-2-MoP – Mobile Private Microblogging
[chapter]
2014
Lecture Notes in Computer Science
In this paper, we present a decentralized privacy-preserving microblogging infrastructure based on a distributed peer-to-peer network of mobile users. ...
However, current services like Twitter rely on a centralized infrastructure, which has serious drawbacks from privacy and reliability perspectives. ...
We thank the anonymous reviewers and our shepherd Urs Hengartner for their valuable comments. Mihai Bucicoiu was funded by the Romanian Ministry of Labour through grant POSDRU 76903. ...
doi:10.1007/978-3-662-45472-5_25
fatcat:vy77ba3kvje2bk4uri5hxe6xvq
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part I
2015
IEEE Transactions on Computational Social Systems
The paper "PIF: A Personalized Fine-grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks" by Zhang et al. proposed a personalized fine-grained filtering scheme with privacy ...
The paper "Rumor Identification in Microblogging Systems Based on Users' Behavior" by Liang et al. investigated the machine learning-based rumor identification approaches and proposed a method to predict ...
doi:10.1109/tcss.2016.2527158
fatcat:sd3lco3dovbbdmnvfcqj74vsea
Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part II
2015
IEEE Transactions on Computational Social Systems
The paper "PIF: A Personalized Fine-grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks" by Zhang et al. proposed a personalized fine-grained filtering scheme with privacy ...
The paper "Rumor Identification in Microblogging Systems Based on Users' Behavior" by Liang et al. investigated the machine learning-based rumor identification approaches and proposed a method to predict ...
doi:10.1109/tcss.2016.2527159
fatcat:o42kubzkerafbcdcepsfoul3bu
Analyzing Privacy Designs of Mobile Social Networking Applications
2008
2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
While sharing location through mobile SNAs is useful for information access and user interactions, privacy issues must be addressed at the design levels of mobile SNAs. ...
The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are expected to revolutionize ...
Due the popularity and ease of use of microblogging services, Twitter has also emerged as a messaging platform that may have subtle implications on conversational privacy. ...
doi:10.1109/euc.2008.156
dblp:conf/euc/ChenR08
fatcat:ztwk5hitmzft3mcqoa2lnj43vi
Explaining mobile government social media continuance from the valence perspective: A SEM-NN approach
2021
PLoS ONE
The results of SEM indicated that the positive utilities included social value and hedonic value positively affect mobile GSM continuance, while the negative utility reflected by self-censorship negative ...
media (GSM) continuance based on the valence framework. ...
On the other hand, even though, the impact of privacy concerns on mobile GSM continuance is not significant. ...
doi:10.1371/journal.pone.0246483
pmid:33539466
fatcat:wop45ik34vgubfmekon6rmqwda
Enterprise Microblogging to Augment the Subinternship Clinical Learning Experience: A Proof-of-Concept Quality Improvement Study
2018
JMIR Medical Education
Results: Fifty-six medical students rotated on an internal medicine subinternship from July 2014-June 2016. Eighty-four percent of the students returned the post-rotation survey. ...
Compared to the pilot year, the scale-up year demonstrated a significant increase in number of students with >10 posts (scale-up 49% versus pilot year 19%; p=.03) and perceived educational experience ( ...
Acknowledgements The
Multimedia Appendix 1: Sample screenshots of the interactive website
Multimedia Appendix 2: Survey instrument ...
doi:10.2196/mededu.9810
pmid:30131315
fatcat:22titcjdsna3rjxj2gkqj3hdwy
Usage and Consequences of Privacy Settings in Microblogs
2015
2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing
Our results enable us to get insights into privacy issues in microblogs, underlining the need of respecting user privacy in microblogs. ...
We suggest to further research user privacy controls usage in order to understand user goals and motivations for sharing and disclosing their microblogging data online with the focus on user cultural origins ...
Next, we outline the main issues and means of protecting user privacy online with a focus on SN and microblogs.
II. ...
doi:10.1109/cit/iucc/dasc/picom.2015.96
dblp:conf/IEEEcit/DaehnhardtTJ15
fatcat:5s4nh5zwyvcyvm7ltz2u6ssula
k-subscription
2013
Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13
This way, it can infer all the subjects a user might be interested in and generate a detailed profile of this user. ...
Over the past few years, microblogging social networking services have become a popular means for information sharing and communication. ...
Acknowledgements We thank our shepherd Matt Fredrikson and the anonymous reviewers for their valuable feedback. This work was supported in part by the ...
doi:10.1145/2523649.2523671
dblp:conf/acsac/PapadopoulosPPZHM13
fatcat:hf6kjhznozgvvamey6s3fx4exy
Micro-Blog
2008
Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08
We believe that significant more impact is latent in the convergence of these ideas on the mobile phone platform. ...
This paper presents the architecture and implementation of one such system, called Micro-Blog. New kinds of application-driven challenges are identified and addressed in the context of this system. ...
Acknowledgments We sincerely thank our shepherd Hans Gellersen and anonymous reviewers for their valuable feedback on this paper. ...
doi:10.1145/1378600.1378620
dblp:conf/mobisys/GaonkarLCCS08
fatcat:3baa522pajhb5ltwbaqammx45a
Design and Implementation of Anonymized Social Network-based Mobile Game System for Learning Mathematics
2018
International Journal of Emerging Technologies in Learning (iJET)
The proposed model enables mining of anonymized data streams originating from both the game and the social network. ...
A microblogging social network service is integrated in the system in a way that enables sending messages without additional authentication and thus facilitates dynamics of the system. ...
and Implementation of Anonymized Social Network-based Mobile Game System …
http://www.i-jet.org Paper-Design and Implementation of Anonymized Social Network-based Mobile Game System …
http:/ ...
doi:10.3991/ijet.v13i12.8762
fatcat:ixz2cieti5garno57iftbwig4a
Exploring user social behaviors in mobile social applications
2011
Proceedings of the 4th Workshop on Social Network Systems - SNS '11
Based on the collected data, our observation reveals the following aspects of user interactions and their influences. ...
However, there is still lack of data for real deployment mobile social application on data analysis of human interaction and social behaviors in mobile social networks. ...
ACKNOWLEDGEMENTS We would like to thank the volunteers who participated our experiments in both University of Goettingen and Nanjing University. ...
doi:10.1145/1989656.1989659
dblp:conf/sns/ZhuHCFL11
fatcat:rs7rm2n3fncezhlau43uzbcuvu
Implicit Privacy Protection in Spatio-temporal Data Distribution
2018
Journal of Information Hiding and Multimedia Signal Processing
Finally, the proposed algorithm is tested on several real data sets, and it is proved that these algorithms have high protection effect and performance. ...
In this paper, a nested-loop algorithm based on prefix filtering is proposed, which is based on the discovery-elimination of privacy protection. ...
(ε, k) on the performance of privacy (3)Effect of privacy protection parameters (ε, k) on the effect and performance of privacy protection algorithm 5.1. ...
dblp:journals/jihmsp/XiaY18
fatcat:ianbxtta6fc2dkur7zqxryklhy
Peer-to-Peer based Social Networks: A Comprehensive Survey
[article]
2020
arXiv
pre-print
Most, if not all, of these platforms are based on centralized computing systems, meaning that the control and management of the systems lies in the hand of one provider, which must be trusted to treat ...
While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store. ...
For mobile P2P networks, [246] propose the use of a Secretsharing-based Mutual Anonymity Protocol (SAM) for enforcing anonymity in mobile P2P networks. ...
arXiv:2001.02611v2
fatcat:nrvp45dy3rbnhmajtvqiect3ty
Hiding stars with fireworks
2009
Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09
In CacheCloak, a trusted anonymizing server generates mobility predictions from historical data and submits intersecting predicted paths simultaneously to the LBS. ...
We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data. ...
Mobility prediction based on historical mobility patterns and the bit-mask of caches is performed at the intermediate server. ...
doi:10.1145/1614320.1614358
dblp:conf/mobicom/MeyerowitzC09
fatcat:vn7zsenefjcbhewokcp7fgl4s4
Data Protection of Internet Enterprise Platforms in the Era of Big Data
2022
Journal of Web Engineering
However, Internet enterprise platform companies generally infringe on personal privacy in various stages of information collection, processing and application, and Internet enterprise platform data protection ...
The high ambiguity in the definition and attribution of "data rights", the low cost and high concealment of infringements, and the value difference between intellectual property protection and digital ...
Acknowledgements This paper is Supported by the National Social Science Fund of China (16ZDA086, 20BSH002), and the Independent Research (Humanities and Social Sciences) at Wuhan University (413000057) ...
doi:10.13052/jwe1540-9589.21314
fatcat:qxvfyyqkirchlbhetdi5mg3qia
« Previous
Showing results 1 — 15 out of 1,206 results