Rashtian et al., 2014 - Google Patents
To befriend or not? A model of friend request acceptance on FacebookRashtian et al., 2014
View PDF- Document ID
- 7653145387470821937
- Author
- Rashtian H
- Boshmaf Y
- Jaferian P
- Beznosov K
- Publication year
- Publication venue
- 10th Symposium On Usable Privacy and Security (SOUPS 2014)
External Links
Snippet
Accepting friend requests from strangers in Facebook-like online social networks is known to be a risky behavior. Still, empirical evidence suggests that Facebook users often accept such requests with high rate. As a first step towards technology support of users in their …
- 230000006399 behavior 0 abstract description 30
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rashtian et al. | To befriend or not? A model of friend request acceptance on Facebook | |
Qureshi et al. | IT‐mediated social interactions and knowledge sharing: Role of competence‐based trust and background heterogeneity | |
Kang et al. | Privacy Attitudes of Mechanical Turk Workers and the {US}. Public | |
CN102317903B (en) | Use social information that user conversation is authenticated | |
Hu et al. | Multiparty access control for online social networks: model and mechanisms | |
Crossler et al. | Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem | |
Harbach et al. | On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards | |
Norcie et al. | Bootstrapping trust in online dating: Social verification of online dating profiles | |
Consolvo et al. | " Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns | |
Grewal | Suspending Cambridge Analytica and SCL Group from Facebook | |
Samermit et al. | {“Millions} of people are watching {you”}: Understanding the {Digital-Safety} Needs and Practices of Creators | |
Vardarlıer et al. | Social media and crisis management: The case study of Cambridge Analytica | |
Ahmadinejad et al. | Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems | |
Hwang et al. | Trust and Friction: Negotiating How Information Flows Through Decentralized Social Media | |
Noah et al. | Evaluating privacy & security of online dating applications with a focus on older adults | |
Choejey et al. | Exploring Critical Success Factors for Cybersecurity in Bhutan’s Government Organizations | |
Lee et al. | Sharing experiences and seeking informal justice online: a grounded theory analysis of Zoombombing victimization on Reddit | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Nekrasov et al. | A user-driven free speech application for anonymous and verified online, public group discourse | |
Dev | Privacy-preserving conversational interfaces | |
Aljallad et al. | Designing a Mobile Application to Support Social Processes for Privacy | |
Sehat et al. | Ethical approaches to closed messaging research: considerations in democratic contexts | |
Rashtian | Towards understanding how users decide about friendship requests in Online Social Networks | |
Coughlan et al. | Social Media: The law simply stated | |
Akese et al. | Exploring vulnerabilities and mitigation strategies among high school students: A qualitative analysis study |