Guo, 2008 - Google Patents
Stranger danger and the online social networkGuo, 2008
View PDF- Document ID
- 12360309308602877717
- Author
- Guo R
- Publication year
- Publication venue
- Berkeley Tech. LJ
External Links
Snippet
The Internet has opened new channels of communication and self-expression. Countless individuals use message boards, date matching sites, interactive social networks, blog hosting services and video sharing websites to make themselves and their ideas visible to …
- 230000002452 interceptive 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
- H04L12/1813—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
- H04L12/1822—Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/04—Real-time or near real-time messaging, e.g. instant messaging [IM]
- H04L51/046—Real-time or near real-time messaging, e.g. instant messaging [IM] interacting with other applications or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/403—Arrangements for multiparty communication, e.g. conference
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements or protocols for real-time communications
- H04L65/40—Services or applications
- H04L65/4007—Services involving a main real-time session and one or more additional parallel sessions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/32—Messaging within social networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/28—Details regarding addressing issues
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Guo | Stranger danger and the online social network | |
Hutchings et al. | Exploring the provision of online booter services | |
Prichard et al. | Effects of automated messages on internet users attempting to access “barely legal” pornography | |
Fire et al. | Online social networks: threats and solutions | |
Stringhini et al. | Detecting spammers on social networks | |
Sarkar | Use of technology in human trafficking networks and sexual exploitation: A cross-sectional multi-country study | |
Nyasvisvo et al. | Phishing attacks: a security challenge for university students studying remotely | |
Claypoole et al. | Protecting Your Internet Identity: Are You Naked Online? | |
Kortjan et al. | A cyber security awareness and education framework for South Africa | |
US20200034487A1 (en) | Method of Implementing A Topic Based Social Media Network | |
Popescul et al. | Social networks security in universities: Challenges and solutions | |
Malar | Impact of cyber crimes on social networking pattern of girls | |
Rashid | Online Radicalization: Bangladesh Perspective | |
Shahid et al. | Privacy threats on social networking websites | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Bettencourt | Empirical assessment of risk factors: How online and offline lifestyle, social learning, and social networking sites influence crime victimization | |
Ahmad | YouTube usage and behaviour change among Nigerian university students | |
Frimpong | Privacy Controls in Social Media | |
Hoffmann | An Exploratory Study of a User's Facebook Security and Privacy Settings | |
Ramirez et al. | The Use of Social Media and the Internet for the Facilitation of Human Trafficking | |
Thomas | Social engineering | |
Reips | Privacy and the Disclosure of Information on the Internet: Issues and Measurement | |
Turan | The Internet and social media as information operations and public relations tools for the Turkish armed forces | |
Dowdell | Youth, Social Media, and Internet Crime | |
Ohana | How Has the Security Landscape Changed in the Last Ten Years with the Rise of Social Media Influencers |