[go: up one dir, main page]

Frauenstein et al., 2011 - Google Patents

The wild wide west of social networking sites

Frauenstein et al., 2011

View PDF
Document ID
5332418180217021292
Author
Frauenstein E
Von Solms R
Publication year
Publication venue
South African Information Security Multi-Conference

External Links

Snippet

Social networking sites have become ever increasingly popular across the world and internet. It is common to find parents, children, co-workers, celebrities and even the elderly registered on popular websites such as Twitter, MySpace, Facebook, YouTube and …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • H04L51/046Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30861Retrieval from the Internet, e.g. browsers
    • G06F17/30864Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
    • G06F17/30867Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/32Messaging within social networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/24Presence management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/107Computer aided management of electronic mail

Similar Documents

Publication Publication Date Title
Alabdan Phishing attacks survey: Types, vectors, and technical approaches
Abraham et al. An overview of social engineering malware: Trends, tactics, and implications
Fire et al. Online social networks: threats and solutions
Bhardwaj et al. Privacy-aware detection framework to mitigate new-age phishing attacks
Shipley et al. Investigating internet crimes: an introduction to solving crimes in cyberspace
Timm et al. Seven deadliest social network attacks
Hassan et al. Digital privacy and security using Windows: A practical guide
Alghenaim et al. Phishing attack types and mitigation: A survey
Grubb How cybersecurity really works: a hands-on guide for total beginners
Adu Michael et al. Mitigating cybercrime and online social networks threats in Nigeria
Oxley A best practices guide for mitigating risk in the use of social media
Shelke et al. Social networking: its uses and abuses
Fryer et al. Malicious web pages: What if hosting providers could actually do something…
Norris Mitigating the effects of doxing
Bhadane et al. STATE OF RESEARCH ON PHISHING AND RECENT TRENDS OF ATTACKS.
Safhi et al. Major security issue that facing social networks with its main defense strategies
Malagi et al. A survey on security issues and concerns to social networks
Sonowal Communication channels
Frauenstein et al. The wild wide west of social networking sites
Frauenstein A framework to mitigate phishing threats
Síochána Cyber Crime
Reuvid The Secure Online Business Handbook: A Practical Guide to Risk Management and Business Continuity
Ananthan et al. Challenges and Issues in Implementing Personal Data Protection.
Hamid et al. Online harassment and digital stalking
Gavou et al. Cyber security enhancement in Nigeria. A case study of six states in the north central (middle belt) of Nigeria