A review on social spam detection: Challenges, open issues, and future directions

S Rao, AK Verma, T Bhatia - Expert Systems with Applications, 2021 - Elsevier
Abstract Online Social Networks are perpetually evolving and used in plenteous
applications such as content sharing, chatting, making friends/followers, customer …

Online social networks security and privacy: comprehensive review and analysis

AK Jain, SR Sahoo, J Kaubiyal - Complex & Intelligent Systems, 2021 - Springer
With fast-growing technology, online social networks (OSNs) have exploded in popularity
over the past few years. The pivotal reason behind this phenomenon happens to be the …

A survey on access control in the age of internet of things

J Qiu, Z Tian, C Du, Q Zuo, S Su… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
With the development of Internet-of-Things (IoT) technology, various types of information,
such as social resources and physical resources, are deeply integrated for different …

Security and privacy of customer data as an element creating the image of the company

J Żywiołek, A Trigo, J Rosak-Szyrocka… - Management Systems in …, 2022 - sciendo.com
COVID-19, mobility, socio-social changes have transferred to the world of social media
communication, purchasing activities, the use of services. Corporate social media has been …

Graph theory: A comprehensive survey about graph theory applications in computer science and social networks

A Majeed, I Rauf - Inventions, 2020 - mdpi.com
Graph theory (GT) concepts are potentially applicable in the field of computer science (CS)
for many purposes. The unique applications of GT in the CS field such as clustering of web …

The application of blockchain in social media: a systematic literature review

MA Hisseine, D Chen, X Yang - Applied Sciences, 2022 - mdpi.com
Social media has transformed the mode of communication globally by providing an
extensive system for exchanging ideas, initiating business contracts, and proposing new …

Detection of malicious social bots: A survey and a refined taxonomy

M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks
(OSNs) as command and control (C&C) channels. Malicious social bots have been used as …

Predicting individuals' vulnerability to social engineering in social networks

SM Albladi, GRS Weir - Cybersecurity, 2020 - Springer
The popularity of social networking sites has attracted billions of users to engage and share
their information on these networks. The vast amount of circulating data and information …

Evaluation of user satisfaction and trust of review platforms: analysis of the impact of privacy and E-WOM in the case of TripAdvisor

JG Martínez-Navalón, V Gelashvili… - Frontiers in …, 2021 - frontiersin.org
Technological advances have had many advantages like an E-WOM (Electronic Word of
Mouth) that has become a very important and powerful tool for users who wish to share their …

Influences of subjective norms on teachers' intention to use social media in working

HTT Tran, NT Nguyen, TT Tang - Contemporary Educational …, 2023 - cedtech.net
This study investigates factors affecting teachers' intention to use the Zalo app–a social
media with impressive users in Vietnam in recent years. The extended technology …