oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Truthy: Enabling the Study of Online Social Networks  [PDF]
Karissa McKelvey,Fil Menczer
Computer Science , 2012,
Abstract: The broad adoption of online social networking platforms has made it possible to study communication networks at an unprecedented scale. Digital trace data can be compiled into large data sets of online discourse. However, it is a challenge to collect, store, filter, and analyze large amounts of data, even by experts in the computational sciences. Here we describe our recent extensions to Truthy, a system that collects Twitter data to analyze discourse in near real-time. We introduce several interactive visualizations and analytical tools with the goal of enabling citizens, journalists, and researchers to understand and study online social networks at multiple scales.
Case Study On Social Engineering Techniques for Persuasion
Mosin Hasan,Nilesh Prajapati,Safvan Vohara
International Journal on Applications of Graph Theory in Wireless ad hoc Networks and Sensor Networks , 2010,
Abstract: T There are plenty of security software in market; each claiming the best, still we daily face problem ofviruses and other malicious activities. If we know the basic working principal of such malware then wecan very easily prevent most of them even without security software. Hackers and crackers are experts inpsychology to manipulate people into giving them access or the information necessary to get access. Thispaper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study,we got 100% success using social engineering techniques for deception on Linux operating system, whichis considered as the most secure operating system. Few basic principal of defend, for the individual aswell as for the organization, are discussed here, which will prevent most of such attack if followed.
Case Study On Social Engineering Techniques for Persuasion  [PDF]
Mosin Hasan,Nilesh Prajapati,Safvan Vohara
Computer Science , 2010, DOI: 10.5121/jgraphoc.2010.2202
Abstract: There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even without security software. Hackers and crackers are experts in psychology to manipulate people into giving them access or the information necessary to get access. This paper discusses the inner working of such attacks. Case study of Spyware is provided. In this case study, we got 100% success using social engineering techniques for deception on Linux operating system, which is considered as the most secure operating system. Few basic principal of defend, for the individual as well as for the organization, are discussed here, which will prevent most of such attack if followed.
Study on the Online Travel Information Search: A Perspective of Social Media  [PDF]
Yuanfang Qian, Jun Hu, Mu Zhang
Advances in Applied Sociology (AASoci) , 2015, DOI: 10.4236/aasoci.2015.58021
Abstract: Social media is playing a more and more important role in the area of online information search. However, few studies are carried out about the matter in China. In the hope of contributing to the study of this subject, the author tends to explore the role of social media in online information search. This research simulates the user’s online travel information search behavior. The author uses Baidu as a search engine and adopts the way of “destination + keywords” as a search model to collect data. Content analysis and multivariate statistical analysis have been used to explore the meanings of the data. This paper finds that social media provides a variety of travel information sources for users, facilitates the restructuring of the tourism information structure and changes the dissemination pattern of the travel information. Countermeasures and suggestions are given on how to provide personalized search results for the online tourists, and how to play the advantages of social media to enhance the tourism enterprises market competitiveness in the future network era.
An Empirical Study on Online Social Networks Sites Usage: Online Dating Sites Perspective  [cached]
Syed Shah Alam,Paul Heng Ping Yeow,Huck Soo Loo
International Journal of Business and Management , 2011, DOI: 10.5539/ijbm.v6n10p155
Abstract: Dating through Internet is providing incredibly useful features. When singles are looking for partners, internet can provide effective and more enjoyable alternatives at a low searching cost. It also provides many new ways and organized approach to mating ritual. This study identifies the attitudes of young adults towards online social networks and online dating sites usage. Besides, this study also examines the different behavior between male and female online daters. The results of this study show that most young adults have a Facebook ID. Only just over ten per cent of them date online. One major finding is that females are searching their long term partners through online dating sites, while the males are mainly interested in building casual relationships.
Awareness of Social Engineering Among IIUM Student  [cached]
Mutasim Elsadig Adam,Omer Yousif,Yusra al-Amodi,Jamaludin Ibrahim
World of Computer Science and Information Technology Journal , 2011,
Abstract: Although most organizations around the world currently pay more attention to securing information systems by means of sophisticated security tools, their information systems still remain breachable. The interpretation of this reality is that the hackers resort to the use of social engineering instead of using their technical skills to acquire information. The concept of social engineering is essentially to manipulate the users of a system, that are considered to be the weakest links on the chain, in order to get said information. The objective of this study is to prove that users of information systems are considered to be the real threat themselves. In this study, we assume that the lack of awareness of social engineering among users makes information systems susceptible to numerous kinds of breaches. In addition to that, the study aims to examine whether IT students possess more awareness of social engineering than students from other faculties. To address these problems, the data was collected from 245 students of the International Islamic University Malaysia (IIUM), via an online survey and questionnaire. Moreover, a phishing phone experiment conducted among a small number of students. The exhibited results showing that a total of 114 students were exposed to social engineering attacks during the last six months, and almost 38% of these attacks through E-mail.
Perceived Influence of Online Social Networks on Academic Performance: A study of Undergraduates in Selected Universities in Ogun State, Nigeria
UD Onuoha, FO Saheed
Information Manager (The) , 2011,
Abstract: This study investigated the perceived influence of online social networks on undergraduates’ academic performance using data from a descriptive survey of 402 respondents from Babcock University, Federal University of Agriculture Abeokuta, and Olabisi Onanbanjo University. Questionnaire was used for data collection. 402 copies of the questionnaire were distributed and a total of 282 were recovered giving a response rate of 70.15%. Data collected were analysed using frequency and percentage counts. Results revealed that majority of the respondents make use of online social networks even though motivation for use is more for social interaction than academic purposes. Most of the respondents, however, agreed that the use of online social networks have positive influence on their academic performance. Based on these findings, the study concluded by recommending, among others, that time spent on online social networks should be devoted more to academic than social activities in order to maximize its education potentials.
Perceptions of Social Loafing in Online Learning Groups: A study of Public University and U.S. Naval War College students  [cached]
Sherry L. Piezon,William D. Ferree
International Review of Research in Open and Distance Learning , 2008,
Abstract: Social loafing research has spanned several decades and fields of study. Research has provided support for both the existence of social loafing and its antecedents within the laboratory, classroom, and work place. Studies regarding the perceptions of social loafing and its effects in the online learning environment, however, are largely non-existent. This study surveyed 227 online learning students who were participating in online learning groups. The study seeks to determine whether the perception of social loafing exists within online learning groups. In addition, several psychosocial factors identified in face-to-face environments are analyzed to determine their impact in online learning groups. Evidence supports both the perception of social loafing in online learning groups as well as similarities between social loafing antecedents in face-to-face groups and those in the online learning environment.
Structural and Dynamical Patterns on Online Social Networks: The Spanish May 15th Movement as a Case Study  [PDF]
Javier Borge-Holthoefer, Alejandro Rivero, I?igo García, Elisa Cauhé, Alfredo Ferrer, Darío Ferrer, David Francos, David I?iguez, María Pilar Pérez, Gonzalo Ruiz, Francisco Sanz, Fermín Serrano, Cristina Vi?as, Alfonso Tarancón, Yamir Moreno
PLOS ONE , 2011, DOI: 10.1371/journal.pone.0023883
Abstract: The number of people using online social networks in their everyday life is continuously growing at a pace never saw before. This new kind of communication has an enormous impact on opinions, cultural trends, information spreading and even in the commercial success of new products. More importantly, social online networks have revealed as a fundamental organizing mechanism in recent country-wide social movements. In this paper, we provide a quantitative analysis of the structural and dynamical patterns emerging from the activity of an online social network around the ongoing May 15th (15M) movement in Spain. Our network is made up by users that exchanged tweets in a time period of one month, which includes the birth and stabilization of the 15M movement. We characterize in depth the growth of such dynamical network and find that it is scale-free with communities at the mesoscale. We also find that its dynamics exhibits typical features of critical systems such as robustness and power-law distributions for several quantities. Remarkably, we report that the patterns characterizing the spreading dynamics are asymmetric, giving rise to a clear distinction between information sources and sinks. Our study represents a first step towards the use of data from online social media to comprehend modern societal dynamics.
A study to investigate the reasons for bank frauds and the implementation of preventive security controls in Indian banking industry  [cached]
Khanna, A.,Arora, B.
International Journal of Business Science and Applied Management , 2009,
Abstract: This paper examines the issue of frauds from the perspective of banking industry. The study seeks to evaluate the various causes that are responsible for banks frauds. It aims to examine the extent to which bank employees follow the various fraud prevention measures including the ones prescribed by Reserve Bank of India. It aims to give an insight on the perception of bank employees towards preventive mechanism and their awareness towards various frauds. The study signifies the importance of training in prevention of bank frauds. A strong system of internal control and good employment practices prevent frauds and mitigate losses. The research reveals that implementation of various internal control mechanisms are not up to the mark. The results indicate that lack of training, overburdened staff, competition, low compliance level (the degree to which procedures and prudential practices framed by Reserve bank of India to prevent frauds are followed) are the main reasons for bank frauds. The banks should take the rising graph of bank frauds seriously and need to ensure that there is no laxity in internal control mechanism.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.