Automatic Detection of Sensitive Information in Educative Social Networks

Author(s):  
Víctor Botti-Cebriá ◽  
Elena del Val ◽  
Ana García-Fornes
Author(s):  
Cédric du Mouza ◽  
Elisabeth Métais ◽  
Nadira Lammari ◽  
Jacky Akoka ◽  
Tatiana Aubonnet ◽  
...  

2019 ◽  
Vol 14 (5) ◽  
pp. 916-943 ◽  
Author(s):  
Ron Berger ◽  
Ram Herstein ◽  
Daniel McCarthy ◽  
Sheila Puffer

Purpose The purpose of this paper is to analyze the role of Wasta, a culturally based system of social networks of exchange among in-group members in the Arab world, as exemplified by three groups of Arabs in the Palestinian Authority, and then compares it to Guanxi (China), Sviazi (Russia) and Jaan–Pechaan (India). The use of social networks is a common business model around the world to accomplish business objectives and is especially relied upon in emerging economies where formal institutions are weak. It is important to understand the commonalities and differences in the use of reciprocity in various cultural contexts in order to conduct business effectively. The aim of the paper is to illustrate the structure of Wasta and how it is perceived and constructed among three Arab social groups, and then compare and contrast it with social business models in three other high context cultures. Design/methodology/approach Qualitative approach based on interviews to better understand the relationships involved. Findings The findings provide the foundation for a number of critical insights for non-Arab managers seeking to do business in the Arab world. For international managers to conduct business successfully, it is essential to understand how Wasta works, and establish relationships with members of influential social networks by building trust over time such that they create Wasta for themselves and indirectly for their firms. Using Wasta in the Arab world, as noted above, is similar to doing business successfully in other emerging economies such as using Sviazi in Russia (McCarthy and Puffer, 2008; Berger et al., 2017), Guanxi in China (Yen et al., 2011) and Jaan–Pechaan in India (Bhattacharjee and Zhang, 2011). The authors feel more confident in stating this view after comparing Wasta with these other three concepts, and noting that all four are built upon the same fundamental constructs. Research limitations/implications The authors recognize that the study is limited in terms of the geographical sample since it does not include any non-Palestinians, although the managers the authors sampled came from various regions in the Palestinian authority. Additionally, Palestinian managers are highly educated and mobile, and can be found in many other Arab countries working in managerial positions (Zineldin, 2002), thus potentially broadening the generalizability of the findings. Nonetheless, the samples would be called ones of convenience rather than randomly drawn from the three groups, since the latter would be extremely difficult to execute not only in the Palestinian Authority but in most of the Arab world due to the culturally based reluctance to provide sensitive information to those outside one’s network. Despite the difficulties that might be involved in exploring such culturally sensitive issues as the authors did in this study, the benefits in knowledge gained can be of significant importance to the study of international business in emerging and transition economies. Originality/value Little research has focused on the use of Wasta in the Arab world, a gap which this paper addresses. The authors do so by analyzing the views of Wasta held by three important groups – leaders, business people and students. While each type of reciprocity has its own unique characteristics, the authors focus on three interrelated constructs that have been found to underlie the use of reciprocity in various cultures. In the Arab world, these are Hamola, which incorporates reciprocity; Somah, that incorporates trust; and Mojamala, which incorporates empathy through social business networks.


2021 ◽  
Vol 189 ◽  
pp. 156-166
Author(s):  
Marwa Khairy ◽  
Tarek M. Mahmoud ◽  
Tarek Abd-El-Hafeez

2018 ◽  
Vol 2018 ◽  
pp. 1-18 ◽  
Author(s):  
Gesu Li ◽  
Zhipeng Cai ◽  
Guisheng Yin ◽  
Zaobo He ◽  
Madhuri Siddula

The recommender system is mainly used in the e-commerce platform. With the development of the Internet, social networks and e-commerce networks have broken each other’s boundaries. Users also post information about their favorite movies or books on social networks. With the enhancement of people’s privacy awareness, the personal information of many users released publicly is limited. In the absence of items rating and knowing some user information, we propose a novel recommendation method. This method provides a list of recommendations for target attributes based on community detection and known user attributes and links. Considering the recommendation list and published user information that may be exploited by the attacker to infer other sensitive information of users and threaten users’ privacy, we propose the CDAI (Infer Attributes based on Community Detection) method, which finds a balance between utility and privacy and provides users with safer recommendations.


Author(s):  
Neelu khare ◽  
Kumaran U.

The tremendous growth of social networking systems enables the active participation of a wide variety of users. This has led to an increased probability of security and privacy concerns. In order to solve the issue, the article defines a secure and privacy-preserving approach to protect user data across Cloud-based online social networks. The proposed approach models social networks as a directed graph, such that a user can share sensitive information with other users only if there exists a directed edge from one user to another. The connectivity between data users data is efficiently shared using an attribute-based encryption (ABE) with different data access levels. The proposed ABE technique makes use of a trapdoor function to re-encrypt the data without the use of proxy re-encryption techniques. Experimental evaluation states that the proposed approach provides comparatively better results than the existing techniques.


Sign in / Sign up

Export Citation Format

Share Document