Sciweavers

146 search results - page 14 / 30
» Analysis of social networking privacy policies
Sort
View
CSE
2009
IEEE
14 years 2 months ago
Information Flow and Search in Unstructured Keyword Based Social Networks
—In online social networks (OSNs), user connections can be represented as a network. The network formed has distinct properties that distinguish it from other network topologies....
Ankush Garg, Prantik Bhattacharyya, Charles U. Mar...
HICSS
2009
IEEE
178views Biometrics» more  HICSS 2009»
14 years 2 months ago
Applying Multi-Layered Analysis Framework on the Public Sector ICT Provision: An Illustration from a Municipal Wireless Network
As technology develops, local governments are increasingly becoming involved in providing municipal wireless service. However, many obstacles exist in municipal wireless provision...
Myungjae Kwak, Thomas A. Horan, Hana Oh
ISI
2008
Springer
13 years 7 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
ISI
2004
Springer
14 years 23 days ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
AIS
2007
Springer
13 years 7 months ago
Unplanned effects of intelligent agents on Internet use: a social informatics approach
This paper instigates a discourse on the unplanned effects of intelligent agents in the context of their use on the Internet. By utilizing a social informatics framework as a lens...
Alexander Serenko, Umar Ruhi, Mihail Cocosila