Sciweavers

2492 search results - page 23 / 499
» False-Name-Proofness in Social Networks
Sort
View
204
Voted
ICSE
2011
IEEE-ACM
14 years 5 months ago
StakeSource2.0: using social networks of stakeholders to identify and prioritise requirements
Software projects typically rely on system analysts to conduct requirements elicitation, an approach potentially costly for large projects with many stakeholders and requirements....
Soo Ling Lim, Daniela Damian, Anthony Finkelstein
113
Voted
CCS
2010
ACM
14 years 12 months ago
Exploiting social networking sites for spam
In this work we present our friend-in-the-middle attacks on SNSs and how it can be used to harvest social data in an automated fashion. This social data can then be exploited for ...
Marcus Huber, Martin Mulazzani, Edgar Weippl, Gerh...
135
Voted
CHI
2003
ACM
16 years 2 months ago
Recommending collaboration with social networks: a comparative evaluation
Studies of information seeking and workplace collaboration often find that social relationships are a strong factor in determining who collaborates with whom. Social networks prov...
David W. McDonald
120
Voted
JIS
2011
112views more  JIS 2011»
14 years 4 months ago
Classifying ecommerce information sharing behaviour by youths on social networking sites
Teenagers and young adults form an economically critical demographic group and are confronted with an array of internet social networking services just as they are forming online ...
Bernard J. Jansen, Kate Sobel, Geoff Cook
155
Voted
INFOCOM
2012
IEEE
13 years 4 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li