Sciweavers

6696 search results - page 42 / 1340
» Securing social networks
Sort
View
CSCW
2010
ACM
14 years 5 months ago
Social language network analysis
In this note we introduce a new methodology that combines tools from social language processing and network analysis to identify socially situated relationships between individual...
Andrew J. Scholand, Yla R. Tausczik, James W. Penn...
SEMWEB
2010
Springer
13 years 6 months ago
Social Dynamics in Conferences: Analyses of Data from the Live Social Semantics Application
Popularity and spread of online social networking in recent years has given a great momentum to the study of dynamics and patterns of social interactions. However, these studies ha...
Alain Barrat, Ciro Cattuto, Martin Szomszor, Woute...
JTAER
2006
78views more  JTAER 2006»
13 years 8 months ago
The Social Dimensions of the Security of Internet banking
This paper examines the users' perspective on the security of Internet banking in Australia within the social context. This user-centered design approach supplements the tech...
Supriya Singh
CODASPY
2011
13 years 13 days ago
Relationship-based access control: protection model and policy language
Social Network Systems pioneer a paradigm of access control that is distinct from traditional approaches to access control. Gates coined the term Relationship-Based Access Control...
Philip W. L. Fong
ICWSM
2009
13 years 6 months ago
A Social Identity Approach to Identify Familiar Strangers in a Social Network
We present a novel problem of searching for `familiar strangers' in a social network. Familiar strangers are individuals who are not directly connected but exhibit some simil...
Nitin Agarwal, Huan Liu, Sudheendra Murthy, Arunab...