Role of Privacy and Trust in Mobile Business Social Networks

Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend the possibilities for people for high level collaboration independently where they are on the globe. Various groups of people can come together according to their private or business interest forming a virtual community (VC) through online social networks. Beside the positive effects of this technical breakthrough there are dangerous sides of using these high level networked systems; the personal data of the individuals can be used by other persons especially when the individual doesn’t take care of them. So, privacy has now an increasingly important role in social networked environments. As trust is the base of the society there is close connection between trust and privacy. The goal of this paper is to present the role and relationships between trust and privacy in mobile (business) social networks, and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.

2015 ◽  
pp. 528-556
Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


Author(s):  
István Mezgár ◽  
Sonja Grabner-Kräuter

New information and communication technologies and their integration extend possibilities for high-level human collaboration. Various groups of people can come together according to their private or business interests forming a virtual community through social networks. However, in addition to the positive effects of this technical breakthrough there are dangerous potential side effects using these high-level networked systems; the sensitive personal or business data can be misused. Therefore, privacy has an increasingly important role in social networks and is becoming a significant area related to business ethics taking into consideration the close connection between trust and privacy. The goal of this chapter is to discuss the role and relationships between trust and privacy in mobile (business) social networks and to introduce the possible types of privacy threats and countermeasures in case of online social networks. A short summary on future trends in mobile social networks is also presented.


2021 ◽  
Vol 33 (1) ◽  
pp. 47-70
Author(s):  
Santhoshkumar Srinivasan ◽  
Dhinesh Babu L. D.

Online social networks (OSNs) are used to connect people and propagate information around the globe. Along with information propagation, rumors also penetrate across the OSNs in a massive order. Controlling the rumor propagation is utmost important to reduce the damage it causes to society. Educating the individual participants of OSNs is one of the effective ways to control the rumor faster. To educate people in OSNs, this paper proposes a defensive rumor control approach that spreads anti-rumors by the inspiration from the immunization strategies of social insects. In this approach, a new information propagation model is defined to study the defensive nature of true information against rumors. Then, an anti-rumor propagation method with a set of influential spreaders is employed to defend against the rumor. The proposed approach is compared with the existing rumor containment approaches and the results indicate that the proposed approach works well in controlling the rumors.


2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


2010 ◽  
Vol 1 (3) ◽  
pp. 59-70
Author(s):  
M. Zamorano ◽  
M.L. Rodríguez ◽  
A. F. Ramos-Ridao ◽  
M. Pasadas

The European Space of Higher Education (ESHE) is a new conceptual formulation of the organization of teaching at the university, largely involving the development of new training models based on the individual student’s work. In this context, the University of Granada has approved two plans of Educational Excellence to promote a culture of quality and stimulate excellence in teaching. The Area of Environmental Technology in the Department of Civil Engineering has developed an innovative project entitled Application of new Information and Communication Technologies (ICT) to the Area of Environmental Technology teaching to create a new communication channel consisting of a Web site that benefits teacher and student (“Environmental Studies Centre”: http://cem.ugr.es). Through this interactive page, teachers can conduct supervised teaching, and students will have the tools necessary for guiding their learning process, according to their capacities and possibilities. However, the material is designed to serve as a complement to the traditional method of attended teaching.


Electronics ◽  
2020 ◽  
Vol 9 (6) ◽  
pp. 918 ◽  
Author(s):  
Ateeq Ur Rehman ◽  
Rizwan Ali Naqvi ◽  
Abdul Rehman ◽  
Anand Paul ◽  
Muhammad Tariq Sadiq ◽  
...  

In the recent era, new information technologies have a significant impact on social networks. Initial integration of information and communication technologies (ICT) into city operations has promoted information city, ease of communication and principles of smart communities. Subsequently, the idea of the Internet of Things (IoT) with the specific focus of social IoT (SIoT) has contributed towards the smart cities (SC), which support the city operations with minimal human interaction. The user-generated data obtained by SIoT can be exploited to produce new useful information for creating citizen-centered smart services for SC. The aim of this research is twofold. Firstly, we used the concept of local and global trust to provide new services in SC based on popular online social networks (OSN) data used by the citizens. Secondly, the sustainability of the three different OSN is assessed. This paper investigates the social network domain with regard to the SC. Although in SC, OSN are increasing day by day, there is still an unresolved issue of trust among their users and also OSN are not much sustainable. In this research, we are analyzing the sustainability of different OSN for the SC. We employ datasets of three different social networks for our analyses. A local trust model is used to identify the central user within the local cluster while the global trust-based framework is used to identify the opinion leaders. Our analysis based on the datasets of Facebook, Twitter, and Slashdot unveil that filtration of these central-local users and opinion leaders result in the dispersion and significant reduction in a network. A novel model is being developed that outlines the relationship between local and global trust for the protection of OSN users in SC. Furthermore, the proposed mechanism uses the data posted by citizens on OSN to propose new services by mitigating the effect of untrusted users.


Author(s):  
Л. Кожевникова ◽  
L. Kozhevnikova ◽  
И. Старовойтова ◽  
I. Starovoytova

The article is devoted to methodological problems of personnel management: the problem of ethical values in the management of an organization, the problem of the relationship between ethics and economics, the problem of synthesizing positive and normative approaches within the framework of economics, the problem of balancing the basic values of the work ethic of an ethnos and socio-economic institutional factors of modern society. A classifi cation of ethical dilemmas in the organization is proposed: dilemmas at the individual level (professional ethics of the personnel manager), at the organizational level (ethics of the organization) and at the social level (economic ethics). The article shows the new ethical problems to which the spread of new information and communication technologies leads. The authors conclude that the humanistic economic theory of a civilized society has been developing.


Author(s):  
Paula Brito

The theme of this paper is the paradigm shift in the outlook of workers’ privacy protection. The focus of this work is the successive and recent evolution of this theme, defending an active approach to privacy, per which the workers have sufficient control over their data. The theoretical framework of the worker’s right to privacy and its adaptation to the current technological world is the base of the adopted methodology. It includes the study of the legislation, doctrinal and jurisprudential positions, and guidelines from various bodies and entities. The conclusions summarise the current challenges faced by the labour jurist, in an era when NICT (new information and communication technologies) are part of the corporate environment to find ways to raise awareness about the reaffirmation of limits and control of technology, as the only way to guarantee the safeguarding of the workers’ fundamental rights, which are undoubtedly essential for defending the worker in a potentially absorbing context outside his domain, being subject to corporate power. The conciliation between the defence of workers’ privacy, on the one hand, and business interests and rights, on the other hand, is the reference for balance.


Author(s):  
Oksana Gaiduk

The purpose of the article is to investigate the influence of information culture on the formation of a superhero image of the XXI century. The research methodology includes such methods as analysis, synthesis, and systems approach, which makes it possible to trace and determine the vector of influence of information culture and digital processes taking place in connection with the informatization of society, on the transformation of the image of a superhero. The scientific novelty lies in the fact that virtual and augmented reality in the popularization of Ukrainian superheroes acts as a phenomenon that is considered not only as a result of interaction with people but also as an artifact of the new information era; the peculiarities of becoming a national hero as the basis of self-identification of modern Ukrainian society in the context of the specifics of information and communication technologies, are analyzed. Conclusions. Information culture is considered as a sphere of culture associated with the functioning of information in society and the formation of information qualities of a person. However, the phenomenon of the influence of information culture on the formation of the hero's image through the basis of society's self-identification in the modern dimension still remains unexplored. On a personal level, a person is surrounded by images, contradictory and disproportionate, and begins to simply consume the symbols and images of newly created superheroes. The structure of information culture includes a worldview component that provides motivation for information training of the individual; knowledge of the information environment, the laws of its operation, the ability to navigate in information flows. The information level of modern man is determined by his information culture, and the information culture of the individual, as a culture in general, reflects the active creative activity of man, and, accordingly, the development of man himself as a subject of this activity.


Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


Sign in / Sign up

Export Citation Format

Share Document