Open Access
Issue |
ITM Web Conf.
Volume 64, 2024
2nd International Conference on Applied Computing & Smart Cities (ICACS24)
|
|
---|---|---|
Article Number | 01006 | |
Number of page(s) | 13 | |
DOI | https://doi.org/10.1051/itmconf/20246401006 | |
Published online | 05 July 2024 |
- Tannous, G., & Barbar, A. M. An expert system to detect privacy’s vulnerability of social networks. 2016 IEEE International Multidisciplinary Conference on Engineering Technology (IMCET). volume 140, 7 (2016). [Google Scholar]
- Etuh, E., Bakpo, F. S., and Agozie, H. E. ‘Social Media Network Attacks and Their Preventive Mechanisms: A Review’, Science Direct, Volume 140, 14 (2022). [Google Scholar]
- Shevchuk, R. and Pastukh, Y. ‘Improving the security of social media accounts’, Journal Title in Italics, Volume (Issue), 5 (2019). [Google Scholar]
- Thuraisingham, B. ‘The Role of Artificial Intelligence and Cyber Security for Social Media’, Science Direct, vol issues, 3 (2020). [Google Scholar]
- herd. Digital/blog/facebook-statistics-2022 [Google Scholar]
- Zhang, Z., and Gupta, B. B. ‘Social Media Security and Trustworthiness: Overview and New Direction’, Science Direct, volume 86, 12 (2018). [Google Scholar]
- Kumar, S. N., Saravanakumar, K., and Deepa, K. ‘On Privacy and Security in Social Media – A Comprehensive Study’, Science Direct, volume 78, 6 (2016). [Google Scholar]
- Li, L. and Qian, K. ‘Using Real-Time Fear Appeals to Improve Social Media Security’, Science Direct, Science Direct, volume 125, 4 (2016). [Google Scholar]
- Pattnaik, N., Li, S., and Nurse, J. R. C. ‘Perspectives of Non-Expert Users on Cyber Security and Privacy: An Analysis of Online Discussions on Twitter’, Science Direct, volume 125, 15 (2022). [Google Scholar]
- Yue, H., He, S., & Liu, Z. Social Media Users Send Promotional Links to Strangers: Legitimate Promotion or Security Vulnerability? IEEE Access, volume 140, 14 (2020). [Google Scholar]
- Senthil Kumar, N., Saravanakumar, K., & Deepa, K, On Privacy and Security in Social Media – A Comprehensive Study, science direct, Science Direct, volume 78, 6 (2016). [Google Scholar]
- Gordhan Jethava a, Udai Pratap Rao b, Exploring security and trust mechanisms in online social networks: An extensive review, volume 140, 13 (2023). [Google Scholar]
- David Tayouri, The Human Factor in the Social Media Security – Combining Education and Technology to Reduce Social Engineering Risks and Damages, Science Direct, Volume 3, 5 (2015) [Google Scholar]
- Lionel Khalil a, Nancy Abi Karam b, Security Management: Real versus Perceived Risk of Commercial Exploitation of Social Media Personal Data, Science Direct, Volume 65, 10 (2015). [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.