scholarly journals PACMAN: Personal Agent for Access Control in Social Media

2017 ◽  
Vol 21 (6) ◽  
pp. 18-26 ◽  
Author(s):  
Gaurav Misra ◽  
Jose M. Such
2020 ◽  
Vol 105 (5) ◽  
pp. 43-67
Author(s):  
Friedemann Vogel

This paper presents elements of a theory of “authentification”. The focus is on socio-semiotical practices of identification and access control as part of social struggles for the distribution of limited resources. Within this conceptual framework, the fuzzy concept of “authenticity” can be dissolved and the habitual, temporal, modal and media constituents of the negotiation of authentication and authorisation can be brought to the fore. The theoretical considerations are illustrated with examples from the field of security industry (bouncers), cryptography and social media.


2018 ◽  
Vol 18 ◽  
pp. 7381-7388
Author(s):  
Ishaan Chawla

Face recognition has become a popular topic of research recently due to increases in demand for security as well as the rapid development of mobile devices. There are many applications which face recognition can be applied to such as access control, identity verification, security systems, surveillance systems, and social media networks. Access control includes offices, computers, phones, ATMs, etc. Most of these forms currently do not use face recognition as the standard form of granting entry, but with advancing technologies in computers along with more refined algorithms, facial recognition is gaining some traction in replacing passwords and fingerprint scanners. Ever since the events of 9/11 there has been a more concerned emphasis on developing security systems to ensure the safety of innocent citizens. Namely in places such as airports and border crossings where identification verification is necessary, face recognition systems potentially have the ability to mitigate the risk and ultimately prevent future attacks from occurring. As for surveillance systems, the same point can be made if there are criminals on the loose. Surveillance cameras with face recognition abilities can aide in efforts of finding these individuals. Alternatively, these same surveillance systems can also help identify the whereabouts of missing persons, although this is dependent on robust facial recognition algorithms as well as a fully developed database of faces. And lastly, facial recognition has surfaced in social media applications on platforms such as Facebook which suggest users to tag friends who have been identified in pictures. It is clear that there are many applications the uses for facial recognition systems. In general, the steps to achieve this are the following: face detection, feature extraction, and lastly training a model.


2017 ◽  
Vol 5 (1) ◽  
pp. 14-26
Author(s):  
Alex Koohang

This study attempts to empirically validate a social media sites privacy concerns instrument with six constructs (collection, secondary usage, errors, improper access, control, & awareness). Each construct includes three designated items/variables. Data were collected from 157 participants and analyzed using exploratory factor analysis. The results indicated that all six constructs of the instrument were reliable to measure social media sites privacy concerns of users. Recommendations for future research are provided.


ASHA Leader ◽  
2015 ◽  
Vol 20 (7) ◽  
Author(s):  
Vicki Clarke
Keyword(s):  

ASHA Leader ◽  
2013 ◽  
Vol 18 (5) ◽  

As professionals who recognize and value the power and important of communications, audiologists and speech-language pathologists are perfectly positioned to leverage social media for public relations.


2013 ◽  
Vol 44 (1) ◽  
pp. 4
Author(s):  
Jane Anderson
Keyword(s):  

2011 ◽  
Vol 44 (7) ◽  
pp. 75
Author(s):  
SALLY KOCH KUBETIN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document