Frauenstein et al., 2011 - Google Patents
The wild wide west of social networking sitesFrauenstein et al., 2011
View PDF- Document ID
- 5332418180217021292
- Author
- Frauenstein E
- Von Solms R
- Publication year
- Publication venue
- South African Information Security Multi-Conference
External Links
Snippet
Social networking sites have become ever increasingly popular across the world and internet. It is common to find parents, children, co-workers, celebrities and even the elderly registered on popular websites such as Twitter, MySpace, Facebook, YouTube and …
- 230000003203 everyday 0 abstract description 2
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/32—Messaging within social networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/107—Computer aided management of electronic mail
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alabdan | Phishing attacks survey: Types, vectors, and technical approaches | |
Abraham et al. | An overview of social engineering malware: Trends, tactics, and implications | |
Fire et al. | Online social networks: threats and solutions | |
Bhardwaj et al. | Privacy-aware detection framework to mitigate new-age phishing attacks | |
Shipley et al. | Investigating internet crimes: an introduction to solving crimes in cyberspace | |
Timm et al. | Seven deadliest social network attacks | |
Hassan et al. | Digital privacy and security using Windows: A practical guide | |
Alghenaim et al. | Phishing attack types and mitigation: A survey | |
Grubb | How cybersecurity really works: a hands-on guide for total beginners | |
Adu Michael et al. | Mitigating cybercrime and online social networks threats in Nigeria | |
Oxley | A best practices guide for mitigating risk in the use of social media | |
Shelke et al. | Social networking: its uses and abuses | |
Fryer et al. | Malicious web pages: What if hosting providers could actually do something… | |
Norris | Mitigating the effects of doxing | |
Bhadane et al. | STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS. | |
Safhi et al. | Major security issue that facing social networks with its main defense strategies | |
Malagi et al. | A survey on security issues and concerns to social networks | |
Sonowal | Communication channels | |
Frauenstein et al. | The wild wide west of social networking sites | |
Frauenstein | A framework to mitigate phishing threats | |
Síochána | Cyber Crime | |
Reuvid | The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity | |
Ananthan et al. | Challenges and Issues in Implementing Personal Data Protection. | |
Hamid et al. | Online harassment and digital stalking | |
Gavou et al. | Cyber security enhancement in Nigeria. A case study of six states in the north central (middle belt) of Nigeria |