Exploiting Privacy-Policy and -Management Features on Social Networks: A User's Perspective
A social network is a type of media that allows users to engage social interaction in the cyber world. Nowadays, this network becomes a backbone of the digital communication world as it transformed the way of information being shared across the different communities. Exploiting this network, people...
| Main Authors: | Mohd Ishak, Ismail, Rahman, Md. Arafatur, Azad, Saiful |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE
2016
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/28948/ http://umpir.ump.edu.my/id/eprint/28948/1/Exploiting%20privacy-policy%20and%20-management%20features%20on%20social%20networks_FULL.pdf http://umpir.ump.edu.my/id/eprint/28948/2/Exploiting%20privacy-policy%20and%20-management%20features%20on%20social%20networks.pdf |
Similar Items
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019)
by: Tao, Hai, et al.
Published: (2019)
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018)
Compilation of Social Media and Social Networking Sites Features
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Crowd Associated Network: Exploiting over a Smart Garbage Management System
by: Azad, Saiful, et al.
Published: (2017)
by: Azad, Saiful, et al.
Published: (2017)
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks
by: Rahman, Md. Arafatur, et al.
Published: (2019)
by: Rahman, Md. Arafatur, et al.
Published: (2019)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
by: Abiodun, Balogun Kamoru
Published: (2021)
by: Abiodun, Balogun Kamoru
Published: (2021)
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Region-Based Distance Analysis of Keyphrases: A New Unsupervised Method for Extracting Keyphrases Feature from Articles
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
by: Miah, Mohammad Badrul Alam, et al.
Published: (2021)
Information disclosure behaviour in social media among Malaysian youth : the impact of privacy concern, risk and trust
by: Norsaremah Salleh,, et al.
Published: (2011)
by: Norsaremah Salleh,, et al.
Published: (2011)
IoT enable relay network for demand based light intensity controlled seamless highway lighting system
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
A reliable friendship mechanism for online social network exploiting pre and post-filtering approach
by: S M Nazmus, Sadat
Published: (2022)
by: S M Nazmus, Sadat
Published: (2022)
Cancer Patient Portal : Investigating Users' Willingness To Publish From The Privacy Perspective
by: Chan, Hoon Hong
Published: (2009)
by: Chan, Hoon Hong
Published: (2009)
A secure and intelligent framework for vehicle health monitoring exploiting big-data analytics
by: Rahman, Md. Arafatur, et al.
Published: (2022)
by: Rahman, Md. Arafatur, et al.
Published: (2022)
Deep learning enabled fall detection exploiting gait analysis
by: Anwary, Arif Reza, et al.
Published: (2022)
by: Anwary, Arif Reza, et al.
Published: (2022)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
The Impacts Of Social Networking Sites In Higher Learning
by: Mohd Ishak, Ismail, et al.
Published: (2016)
by: Mohd Ishak, Ismail, et al.
Published: (2016)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Development of data quality dimensions from user’s perspective framework
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
by: Mohd Zafrol, Abdullah, et al.
Published: (2018)
Social networks privacy policy awareness among undergraduate students: the case of Twitter
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
Perception analysis of social networks’ privacy policy: Instagram as a case study
by: Talib, Shuhaili, et al.
Published: (2014)
by: Talib, Shuhaili, et al.
Published: (2014)
A supervised learning neural network approach for the prediction of supercapacitive energy storage materials
by: Varun, Geetha Mohan, et al.
Published: (2022)
by: Varun, Geetha Mohan, et al.
Published: (2022)
Midrange exploration exploitation searching particle swarm optimization in dynamic environment
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
by: Nurul Izzatie Husna, Fauzi, et al.
Published: (2021)
Security mechanisms and data access protocols in innovative wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
by: Pathan, Al-Sakib Khan, et al.
Published: (2018)
SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things
by: Rahman, Md. Arafatur, et al.
Published: (2021)
by: Rahman, Md. Arafatur, et al.
Published: (2021)
Mobile application for concrete strength measurement tools by exploiting heat imaging information
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
Slicing-based enhanced method for privacy-preserving in publishing big data
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
by: BinJubeir, Mohammed Ma., et al.
Published: (2022)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
A review on security and privacy issues in E-learning and the MapReduce aproach
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
by: Noor Akma, Abu Bakar, et al.
Published: (2019)
A Survey on Balancing Data Loss Prevention (DLP) with User Privacy in a
Data-Driven World
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
by: Nurhafizah, Ahmad Zaini, et al.
Published: (2024)
Determining the indicators of social capital theory to social network sites
by: Sander, Tom, et al.
Published: (2014)
by: Sander, Tom, et al.
Published: (2014)
Remote photo gallery with users management
by: Lim , Chee Kian
Published: (2005)
by: Lim , Chee Kian
Published: (2005)
A sports tournament scheduling problem: Exploiting constraint-based algorithm and neighborhood search for the solution
by: Razamin, Ramli, et al.
Published: (2012)
by: Razamin, Ramli, et al.
Published: (2012)
A smart monitoring system for campus using ZigBee wireless sensor networks
by: Allahham, Alaa Azmi, et al.
Published: (2018)
by: Allahham, Alaa Azmi, et al.
Published: (2018)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
A combined weighting for the feature-based method on topological parameters in semantic taxonomy using social media
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
by: Ali Muttaleb, Hasan, et al.
Published: (2020)
The influence of extended warranty policy in Malaysian culture perspective : a case study in automobile
by: Osman Widaa, Amro
Published: (2008)
by: Osman Widaa, Amro
Published: (2008)
Channel Availability for Mobile Cognitive Radio Networks
by: Cacciapuoti, Angela Sara, et al.
Published: (2015)
by: Cacciapuoti, Angela Sara, et al.
Published: (2015)
The Effect of Security and Privacy Perceptions on Customers' Trust to Accept Internet Banking Services An Extension of TAM
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
by: Mohamrned A, Al-Sharafi, et al.
Published: (2016)
Similar Items
-
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks
by: Rahman, Md. Arafatur, et al.
Published: (2018) -
Economic perspective analysis of protecting big data security and privacy
by: Tao, Hai, et al.
Published: (2019) -
Root exploit detection and features optimization: Mobile device and blockchain based medical data management
by: Ahmad Firdaus, Zainal Abidin, et al.
Published: (2018) -
Compilation of Social Media and Social Networking Sites Features
by: Ruzainisuhanaliza, Abdul Muni, et al.
Published: (2013) -
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)