Sciweavers

2492 search results - page 3 / 499
» False-Name-Proofness in Social Networks
Sort
View
ASUNAM
2011
IEEE
12 years 5 months ago
Predicting Network Response Times Using Social Information
—Social networks and discussion boards have become a significant outlet where people communicate and express their opinion freely. Although the social networks themselves are us...
Chen Liang, Sharath Hiremagalore, Angelos Stavrou,...
DIMVA
2011
12 years 8 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...
PERCOM
2010
ACM
13 years 3 months ago
Social-K: Real-time K-anonymity guarantees for social network applications
—Traditional approaches to K-anonymity provide privacy guarantees over publicly released data sets with specified quasi-identifiers. However, the most common public releases of...
Aaron Beach, Mike Gartrell, Richard Han
CSCW
2002
ACM
13 years 5 months ago
Stimulating social engagement in a community network
One of the most challenging problems facing builders and facilitators of community networks is to create and sustain social engagement among members. In this paper, we investigate...
David R. Millen, John F. Patterson
CHI
2011
ACM
12 years 9 months ago
Identifying social capital in the facebook interface
A number of studies have identified a robust relationship between the use of social network sites, particularly Facebook, and positive outcomes such as social capital. Social netw...
Christian Yoder, Fred Stutzman