Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








1,206 Hits in 5.8 sec

MoP-2-MoP – Mobile Private Microblogging [chapter]

Marius Senftleben, Mihai Bucicoiu, Erik Tews, Frederik Armknecht, Stefan Katzenbeisser, Ahmad-Reza Sadeghi
2014 Lecture Notes in Computer Science  
In this paper, we present a decentralized privacy-preserving microblogging infrastructure based on a distributed peer-to-peer network of mobile users.  ...  However, current services like Twitter rely on a centralized infrastructure, which has serious drawbacks from privacy and reliability perspectives.  ...  We thank the anonymous reviewers and our shepherd Urs Hengartner for their valuable comments. Mihai Bucicoiu was funded by the Romanian Ministry of Labour through grant POSDRU 76903.  ... 
doi:10.1007/978-3-662-45472-5_25 fatcat:vy77ba3kvje2bk4uri5hxe6xvq

Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part I

Mianxiong Dong, Rajiv Ranjan, Albert Y. Zomaya, Man Lin
2015 IEEE Transactions on Computational Social Systems  
The paper "PIF: A Personalized Fine-grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks" by Zhang et al. proposed a personalized fine-grained filtering scheme with privacy  ...  The paper "Rumor Identification in Microblogging Systems Based on Users' Behavior" by Liang et al. investigated the machine learning-based rumor identification approaches and proposed a method to predict  ... 
doi:10.1109/tcss.2016.2527158 fatcat:sd3lco3dovbbdmnvfcqj74vsea

Guest Editorial on Advances in Tools and Techniques for Enabling Cyber–Physical–Social Systems—Part II

Mianxiong Dong, Rajiv Ranjan, Albert Y. Zomaya, Man Lin
2015 IEEE Transactions on Computational Social Systems  
The paper "PIF: A Personalized Fine-grained Spam Filtering Scheme With Privacy Preservation in Mobile Social Networks" by Zhang et al. proposed a personalized fine-grained filtering scheme with privacy  ...  The paper "Rumor Identification in Microblogging Systems Based on Users' Behavior" by Liang et al. investigated the machine learning-based rumor identification approaches and proposed a method to predict  ... 
doi:10.1109/tcss.2016.2527159 fatcat:o42kubzkerafbcdcepsfoul3bu

Analyzing Privacy Designs of Mobile Social Networking Applications

Guanling Chen, Faruq Rahman
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
While sharing location through mobile SNAs is useful for information access and user interactions, privacy issues must be addressed at the design levels of mobile SNAs.  ...  The combined advances of open mobile platforms and online social networking applications (SNAs) are driving pervasive computing to the real-world users, as the mobile SNAs are expected to revolutionize  ...  Due the popularity and ease of use of microblogging services, Twitter has also emerged as a messaging platform that may have subtle implications on conversational privacy.  ... 
doi:10.1109/euc.2008.156 dblp:conf/euc/ChenR08 fatcat:ztwk5hitmzft3mcqoa2lnj43vi

Explaining mobile government social media continuance from the valence perspective: A SEM-NN approach

Yubo Peng, LingWu Wang, Shuiqing Yang, Baogui Xin
2021 PLoS ONE  
The results of SEM indicated that the positive utilities included social value and hedonic value positively affect mobile GSM continuance, while the negative utility reflected by self-censorship negative  ...  media (GSM) continuance based on the valence framework.  ...  On the other hand, even though, the impact of privacy concerns on mobile GSM continuance is not significant.  ... 
doi:10.1371/journal.pone.0246483 pmid:33539466 fatcat:wop45ik34vgubfmekon6rmqwda

Enterprise Microblogging to Augment the Subinternship Clinical Learning Experience: A Proof-of-Concept Quality Improvement Study

Irsk Anderson, Oliver Hulland, Jeanne M Farnan, Wei Wei Lee, Debra Milton, Vineet M Arora
2018 JMIR Medical Education  
Results: Fifty-six medical students rotated on an internal medicine subinternship from July 2014-June 2016. Eighty-four percent of the students returned the post-rotation survey.  ...  Compared to the pilot year, the scale-up year demonstrated a significant increase in number of students with >10 posts (scale-up 49% versus pilot year 19%; p=.03) and perceived educational experience (  ...  Acknowledgements The Multimedia Appendix 1: Sample screenshots of the interactive website Multimedia Appendix 2: Survey instrument  ... 
doi:10.2196/mededu.9810 pmid:30131315 fatcat:22titcjdsna3rjxj2gkqj3hdwy

Usage and Consequences of Privacy Settings in Microblogs

Elena Daehnhardt, Nick K. Taylor, Yanguo Jing
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
Our results enable us to get insights into privacy issues in microblogs, underlining the need of respecting user privacy in microblogs.  ...  We suggest to further research user privacy controls usage in order to understand user goals and motivations for sharing and disclosing their microblogging data online with the focus on user cultural origins  ...  Next, we outline the main issues and means of protecting user privacy online with a focus on SN and microblogs. II.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.96 dblp:conf/IEEEcit/DaehnhardtTJ15 fatcat:5s4nh5zwyvcyvm7ltz2u6ssula

k-subscription

Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos
2013 Proceedings of the 29th Annual Computer Security Applications Conference on - ACSAC '13  
This way, it can infer all the subjects a user might be interested in and generate a detailed profile of this user.  ...  Over the past few years, microblogging social networking services have become a popular means for information sharing and communication.  ...  Acknowledgements We thank our shepherd Matt Fredrikson and the anonymous reviewers for their valuable feedback. This work was supported in part by the  ... 
doi:10.1145/2523649.2523671 dblp:conf/acsac/PapadopoulosPPZHM13 fatcat:hf6kjhznozgvvamey6s3fx4exy

Micro-Blog

Shravan Gaonkar, Jack Li, Romit Roy Choudhury, Landon Cox, Al Schmidt
2008 Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08  
We believe that significant more impact is latent in the convergence of these ideas on the mobile phone platform.  ...  This paper presents the architecture and implementation of one such system, called Micro-Blog. New kinds of application-driven challenges are identified and addressed in the context of this system.  ...  Acknowledgments We sincerely thank our shepherd Hans Gellersen and anonymous reviewers for their valuable feedback on this paper.  ... 
doi:10.1145/1378600.1378620 dblp:conf/mobisys/GaonkarLCCS08 fatcat:3baa522pajhb5ltwbaqammx45a

Design and Implementation of Anonymized Social Network-based Mobile Game System for Learning Mathematics

Petar Juric, Marija Brkic Bakaric, Maja Matetic
2018 International Journal of Emerging Technologies in Learning (iJET)  
The proposed model enables mining of anonymized data streams originating from both the game and the social network.  ...  A microblogging social network service is integrated in the system in a way that enables sending messages without additional authentication and thus facilitates dynamics of the system.  ...  and Implementation of Anonymized Social Network-based Mobile Game System … http://www.i-jet.org Paper-Design and Implementation of Anonymized Social Network-based Mobile Game System … http:/  ... 
doi:10.3991/ijet.v13i12.8762 fatcat:ixz2cieti5garno57iftbwig4a

Exploring user social behaviors in mobile social applications

Konglin Zhu, Pan Hui, Yang Chen, Xiaoming Fu, Wenzhong Li
2011 Proceedings of the 4th Workshop on Social Network Systems - SNS '11  
Based on the collected data, our observation reveals the following aspects of user interactions and their influences.  ...  However, there is still lack of data for real deployment mobile social application on data analysis of human interaction and social behaviors in mobile social networks.  ...  ACKNOWLEDGEMENTS We would like to thank the volunteers who participated our experiments in both University of Goettingen and Nanjing University.  ... 
doi:10.1145/1989656.1989659 dblp:conf/sns/ZhuHCFL11 fatcat:rs7rm2n3fncezhlau43uzbcuvu

Implicit Privacy Protection in Spatio-temporal Data Distribution

Hui Xia, Weiji Yang
2018 Journal of Information Hiding and Multimedia Signal Processing  
Finally, the proposed algorithm is tested on several real data sets, and it is proved that these algorithms have high protection effect and performance.  ...  In this paper, a nested-loop algorithm based on prefix filtering is proposed, which is based on the discovery-elimination of privacy protection.  ...  (ε, k) on the performance of privacy (3)Effect of privacy protection parameters (ε, k) on the effect and performance of privacy protection algorithm 5.1.  ... 
dblp:journals/jihmsp/XiaY18 fatcat:ianbxtta6fc2dkur7zqxryklhy

Peer-to-Peer based Social Networks: A Comprehensive Survey [article]

Newton Masinde, Kalman Graffi
2020 arXiv   pre-print
Most, if not all, of these platforms are based on centralized computing systems, meaning that the control and management of the systems lies in the hand of one provider, which must be trusted to treat  ...  While users aim for privacy and data sovereignty, often the providers aim to monetize the data they store.  ...  For mobile P2P networks, [246] propose the use of a Secretsharing-based Mutual Anonymity Protocol (SAM) for enforcing anonymity in mobile P2P networks.  ... 
arXiv:2001.02611v2 fatcat:nrvp45dy3rbnhmajtvqiect3ty

Hiding stars with fireworks

Joseph Meyerowitz, Romit Roy Choudhury
2009 Proceedings of the 15th annual international conference on Mobile computing and networking - MobiCom '09  
In CacheCloak, a trusted anonymizing server generates mobility predictions from historical data and submits intersecting predicted paths simultaneously to the LBS.  ...  We develop and demonstrate CacheCloak, a system that enables realtime anonymization of location data.  ...  Mobility prediction based on historical mobility patterns and the bit-mask of caches is performed at the intermediate server.  ... 
doi:10.1145/1614320.1614358 dblp:conf/mobicom/MeyerowitzC09 fatcat:vn7zsenefjcbhewokcp7fgl4s4

Data Protection of Internet Enterprise Platforms in the Era of Big Data

Jiaxing Zhang, Anuo Yang, Feng Shuaishuai
2022 Journal of Web Engineering  
However, Internet enterprise platform companies generally infringe on personal privacy in various stages of information collection, processing and application, and Internet enterprise platform data protection  ...  The high ambiguity in the definition and attribution of "data rights", the low cost and high concealment of infringements, and the value difference between intellectual property protection and digital  ...  Acknowledgements This paper is Supported by the National Social Science Fund of China (16ZDA086, 20BSH002), and the Independent Research (Humanities and Social Sciences) at Wuhan University (413000057)  ... 
doi:10.13052/jwe1540-9589.21314 fatcat:qxvfyyqkirchlbhetdi5mg3qia
« Previous Showing results 1 — 15 out of 1,206 results