Social media security and trustworthiness: overview and new direction

Z Zhang, BB Gupta - Future Generation Computer Systems, 2018 - Elsevier
The emerging social media with inherent capabilities seems to be gaining edge over
comprehensiveness, diversity and wisdom, nevertheless its security and trustworthiness …

A review of privacy decision-making mechanisms in online social networks

J Alemany, ED Val, A García-Fornes - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Personal information of online social networks (OSNs) is governed by the privacy policies
chosen by users besides OSN's policies. Users make these decisions using privacy …

Social networking in the aging context: Why older adults use or avoid Facebook

EH Jung, J Walden, AC Johnson, SS Sundar - Telematics and Informatics, 2017 - Elsevier
Despite a growing body of research about older adults' use of social networking sites (SNS),
scholars have not fully explored how this technology is meeting this group's interactional …

Resolving multi-party privacy conflicts in social media

JM Such, N Criado - IEEE Transactions on Knowledge and …, 2016 - ieeexplore.ieee.org
Items shared through Social Media may affect more than one user's privacy-eg, photos that
depict multiple users, comments that mention multiple users, events in which multiple users …

How does perceived overload in mobile social media influence users' passive usage intentions? Considering the mediating roles of privacy concerns and social …

J Li, F Guo, QX Qu, D Hao - International Journal of Human …, 2022 - Taylor & Francis
Social media is becoming an important instrument for interpersonal communication.
However, more and more users attempt to use social media passively and have negative …

The extended 'chilling'effect of Facebook: The cold reality of ubiquitous social networking

B Marder, A Joinson, A Shankar, D Houghton - Computers in Human …, 2016 - Elsevier
Prior research has established the phenomenon of the 'Chilling Effect'where people
constrain the self they present online due to peer-to-peer surveillance on Social Network …

Privacy policy negotiation in social media

JM Such, M Rovatsos - ACM Transactions on Autonomous and Adaptive …, 2016 - dl.acm.org
Social media involve many shared items, such as photos, which may concern more than one
user. The challenge is that users' individual privacy preferences for the same item may …

CyVOD: a novel trinity multimedia social network scheme

Z Zhang, R Sun, C Zhao, J Wang, CK Chang… - Multimedia Tools and …, 2017 - Springer
How to comprehensively explore, improve and deploy multimedia social networks (MSNs)
has become a hot topic in the era of emerging pervasive mobile multimedia. More and more …

An explainable assistant for multiuser privacy

F Mosca, J Such - Autonomous Agents and Multi-Agent Systems, 2022 - Springer
Multiuser Privacy (MP) concerns the protection of personal information in situations where
such information is co-owned by multiple users. MP is particularly problematic in …

Who is peeping at your passwords at Starbucks?—To catch an evil twin access point

Y Song, C Yang, G Gu - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …