Dillard, 2011 - Google Patents
Privacy and security implications of undergraduate students using Facebook: A quantitative examinationDillard, 2011
- Document ID
- 6508381015235258238
- Author
- Dillard T
- Publication year
External Links
Snippet
One of the major technological developments stemming from Web 2.0 is the phenomenon of online social networks. For many participants within the United States, social networks provide an online community where mingling and self-expression are possible. Among the …
- 230000000694 effects 0 abstract description 50
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
- H04L9/3231—Biological data, e.g. fingerprint, voice or retina
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Barocas et al. | Privacy dependencies | |
Zhang et al. | Online astroturfing: A theoretical perspective | |
Muscanell et al. | Weapons of influence misused: A social influence analysis of why people fall prey to internet scams | |
Rogers et al. | Self-reported deviant computer behavior: A big-5, moral choice, and manipulative exploitive behavior analysis | |
Bossler et al. | Predicting online harassment victimization among a juvenile population | |
Tenove et al. | Digital threats to democratic elections: how foreign actors use digital techniques to undermine democracy | |
Graham et al. | Capable guardians in the digital environment: The role of digital literacy in reducing phishing victimization | |
Prichard et al. | Effects of automated messages on internet users attempting to access “barely legal” pornography | |
Appel | Cybervetting: Internet searches for vetting, investigations, and open-source intelligence | |
Chang et al. | Cybersecurity for children: an investigation into the application of social media | |
Marcum et al. | Social networking as a criminal enterprise | |
Agarwal et al. | Security and Privacy in Social Network | |
Norden | How the internet has changed the face of crime | |
Dillard | Privacy and security implications of undergraduate students using Facebook: A quantitative examination | |
Scanlan et al. | Creating honeypots to prevent online child exploitation | |
Spicer | Cybercriminal profiling | |
Al Johani | Personal information disclosure and privacy in social networking sites | |
Maar | An examination of organizational information protection in the era of social media: A study of social network security and privacy protection | |
Ahmed | Cyberstalking: a content analysis of gender-based offenses committed online. | |
Hoffmann | An Exploratory Study of a User's Facebook Security and Privacy Settings | |
Li | Environmental factors affect social engineering attacks | |
Ayob | MARA and public user characteristics in response to phishing emails | |
Lyons | Cyber-enabled financial abuse of older Americans: A public policy problem | |
Sneha et al. | TECHNOLOGY MEDIATED INTERPERSONAL CRIMES AMONG HIGHER SECONDARY SCHOOLSTUDENTS | |
Jerome | CYBERCRIME VICTIMISATION |