Colour as an Indicator of Vulnerability of Users Within Social Networks

Author(s):  
Amanda Cox ◽  
Yeslam Al-Saggaf ◽  
Kate McLean

Social networking users are presented with a plethora of profile and privacy settings; most of which are left defaulted. As a result, there is little understanding of the fields that make up the user profile, the privacy settings available to safeguard the user, and the ramifications of not changing the same. Concerns relating to the unprecedented quantities of Personally Identifiable Information being stored need to be addressed. By employing a risk matrix to a social media profile, a user could be alerted to the potential dangers of the information being contained within the profile. By adapting this tool, the risks to the individual user of a social media profile will be minimised.

Author(s):  
Vipin K. Nadda ◽  
Sumesh Singh Dadwal ◽  
Dirisa Mulindwa ◽  
Rubina Vieira

Revolutionary development in field of communication and information technology have globally opened new avenue of marketing tourism and hospitality products. Major shift in web usage happened when Napster in 1999 released peer-to-peer share media and then with pioneer social networking websites named ‘Six Degrees'. This kind of interactive social web was named as ‘Web 2.0'. It would create openness, community and interaction. Web2. is also known as Social media base. Social media is incudes “all the different kinds of content that form social networks: posts on blogs or forums, photos, audio, videos, links, profiles on social networking web sites, status updates and more”. It allows people to create; upload post and share content easily and share globally. Social media allows the creation and exchange of user-generated content and experiences online. Thus, social media is any kind of information we share with our social network, using social networking web sites and services.


2014 ◽  
pp. 1717-1730
Author(s):  
Joanne Kuzma

The growth of Online Social Networking sites has brought new services and communication methods to consumers. However, along with benefits, serious problems such as online cyber harassment have recently come to the forefront of the electronic media. This behavior can have significant negative effect on individuals, businesses and the social networks. Some sites have begun to provide some levels of protection and create specific anti-harassment policies in their terms of service along with implementing protection technologies. However, these protective measures are not consistent among social media, leaving some consumers at greater risk. This study analyzed 60 worldwide social sites and determined the level of cyber-harassment protection. It reviewed statistical differences among geographical-based social networks. The results showed significant gaps among various social networks, but suggests methods for improving consumer safeguards to provide consistent levels of protection.


Author(s):  
Shalin Hai-Jew

One degree out from an image “selfie” are text-based self-generated user profiles (self-portrayals) on social media platforms; these are self-depictions of the individual as he or she represents to the world. This work-based self-representation must be sufficiently convincing of professionalism and ethics to encourage other professionals to collaborate on shared work projects through co-creation, support, attention, or other work. While project-based track records may carry the force of fact, there are often more subtle messages that have high impact on distant collaborations. One such important dimension is “indirect reciprocity,” or whether the target individual treats collaborators with respect and care and returns altruistic acts with their own acts of altruism. This work describes some analyses of professional profiles on social media platforms (email, social networking, and microblogging) for indicators of indirect reciprocity.


Author(s):  
Márcio J. Mantau ◽  
Marcos H. Kimura ◽  
Isabela Gasparini ◽  
Carla D. M. Berkenbrock ◽  
Avanilde Kemczinski

The issue of privacy in social networks is a hot topic today, because of the growing amount of information shared among users, who are connected to social media every moment and by different devices and displays. This chapter presents a usability evaluation of the privacy features of Facebook's social network. The authors carry out an evaluation composed by three approaches, executed in three stages: first by the analysis and inspection of system's features related to privacy, available for both systems (Web-based systems and mobile-based systems, e.g. app). The second step is a heuristic evaluation led by three experts, and finally, the third step is a questionnaire with 605 users to compare the results between specialists and real users. This chapter aims to present the problems associated with these privacy settings, and it also wants to contribute for improving the user interaction with this social network.


Author(s):  
Ariane J. Utomo

Across developing countries, the role of social networks and social capital in facilitating women's access to income is well documented. However, less is known about how networks facilitated by social networking sites (SNS) may transform women's economic opportunities in these regions. In this chapter, I draw upon a relatively recent phenomenon of the use of SNS as a medium of trade in urban Indonesia. In 2010, I conducted preliminary interviews to examine the dynamics of Facebook-facilitated trade among urban middle-class married women residing in Jakarta, the capital of Indonesia. The interviews highlighted beneficial links between social media, social capital, and productivity – by means of increased personal income. However, this effective link between SNS and income-generating social capital is likely to be a rather distinctive example, as it depends largely on the class, gender, and cultural specificities that shape the nature of online and offline social interactions among my target group.


2019 ◽  
Vol 5 (3) ◽  
pp. 205630511984751 ◽  
Author(s):  
Itai Himelboim ◽  
Guy J. Golan

The diffusion of social networking platforms ushered in a new age of peer-to-peer distributed online advertising content, widely referred to as viral advertising. The current study proposes a social networks approach to the study of viral advertising and identifying influencers. Expanding beyond the conventional retweets metrics to include Twitter mentions as connection in the network, this study identifies three groups of influencers, based on their connectivity in their networks: Hubs, or highly retweeted users, are Primary Influencers; Bridges, or highly mentioned users who associate connect users who would otherwise be disconnected, are Contextual Influencers, and Isolates are the Low Influence users. Each of these users’ roles in viral advertising is discussed and illustrated through the Heineken’s Worlds Apart campaign as a case study. Providing a unique examination of viral advertising from a network paradigm, our study advances scholarship on social media influencers and their contribution to content virality on digital platforms.


2021 ◽  
Vol 9 (2) ◽  
pp. 207-211
Author(s):  
Nilesh Sambhe, Piyush Varma, Arpan Adlakhiya, Aditya Mahakalkar, Nihal Nakade, Renuka Lakhe

With the widespread and easier access of the internet, many people have started to use various social networking sites each catering to their needs. It has been observed that most users prefer to use the same social media handle or username on multiple sites for easier management. This makes it possible to get a hold of the publicly available information about the user. But, with the increase in privacy protections and user restrictions, investigators often struggle to gather information about a user. We propose an automated software to perform this job which uses Open-Source Intelligence Gathering (OSINT) methods where all publicly available information of a user is gathered in an intelligently structured format all at one place. The software will search various social networking sites for the required user profile and gather all publicly available information. This information will then be available to investigators with the facility to export in various digital document formats.


2021 ◽  
Author(s):  
Muhammad Luqman Jamil ◽  
Sebastião Pais ◽  
João Cordeiro ◽  
Gaël Dias

Abstract Online social networking platforms allow people to freely express their ideas, opinions, and emotions negatively or positively. Previous studies have examined user’s sentiments on these platforms to study their behaviour in different contexts and purposes. The mechanism of collecting public opinion information has attracted researchers to automatically classify the polarity of public opinions based on the use of concise language in messages, such as tweets, by analyzing social media data. In this paper, we extend the preceding work [1], by proposing an unsupervised approach to automatically detect extreme opinions/posts in social networks. We have evaluated our performance on five different social network and media datasets. In this work, we use the semi-supervised approach BERT to check the accuracy of our classified dataset. The latter task shows that, in these datasets, posts that were previously classified as negative or positive are, in fact, extremely negative or positive in many cases.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 142
Author(s):  
Hemalatha D ◽  
Almas Begum ◽  
Alex David S

Presently, the growth of Social media is explosive among the users. Increasingly developed social websites like Flickr, Facebook, Google+, LinkedIn etc permits the users to create, share and view the post. Confidentiality is a leading factor required in Social Networks. The social users upload their photos to the social sites that intend to gain public interest for social purposes. The exposure of personal information leads to slipping process like identity stealing, morphing etc, which are against the privacy violations. Relied upon the personal characteristics of users, the privacy settings of each user should be defined. In this paper, a relational study about the privacy settings in Online Social structure is examined. Initiated by the importance of social networks among the social users and their behavior towards Online Social Networks, which is followed by the privacy techniques suggested by other researchers are explored. At last, an overview about the merits and demerits of privacy designs and schemes for the user-uploaded images are presented. The study results a new privacy system that controls the confidential information from being accessed from different devices, including mobile devices and computers.


Sign in / Sign up

Export Citation Format

Share Document