Social Network Security Risks and Vulnerabilities in Corporate Environments

Author(s):  
Fernando Almeida ◽  
José Pinheiro ◽  
Vítor Oliveira

Increasingly social networks are used both in the personal and professional levels, being companies and employees also exposed to the risks posed by them. In this sense, it is relevant to analyze employees' perception of the risks and vulnerabilities posed by the use of social networks in corporate environments. For this purpose, a questionnaire was developed and distributed to 372 employees of small and medium-sized companies that allowed the characterization and analysis of those risks. The results indicate that the security risks are perceived moderately by employees, emphasizing the risk of defamation and cyberbullying as being the most pertinent. On the other hand, the findings indicate that older employees, the existence of lower academic qualifications, and those working in medium-sized companies are more aware of these risks.

2009 ◽  
pp. 67-84
Author(s):  
Marco Solimene

- The present contribution examines the rootedness of a community of xoraxané romá in the city of Rome; rather than simply the continuity of presence in a specific territory, under consideration is the development and maintenance of social networks with the Roman population, specifically in the territories romá reside and/or work in. Further on, the paper describes how rootedness may be conjugated with some forms of mobility: on the one hand, the continuity in specific areas (of work and in some cases of residence), can be maintained through practices of urban circulation; on the other hand, especially when mobility turns on national and transnational scale, the presence - although mobile and changing - of romá who belong to the same social network, spread among different territories, enables singular domestic units to maintain, despite mobility, a continuity with several non-rom realities.


Author(s):  
Naftali Waxman ◽  
Sarit Kraus ◽  
Noam Hazon

In many coalition formation games the utility of the agents depends on a social network. In such scenarios there might be a manipulative agent that would like to manipulate his connections in the social network in order to increase his utility. We study a model of coalition formation in which a central organizer, who needs to form k coalitions, obtains information about the social network from the agents. The central organizer has her own objective: she might want to maximize the utilitarian social welfare, maximize the egalitarian social welfare, or only guarantee that every agent will have at least one connection within her coalition. In this paper we study the susceptibility for manipulation of these objectives, given the abilities and information that the manipulator has. Specifically, we show that if the manipulator has very limited information, namely he is only familiar with his immediate neighbours in the network, then a manipulation is almost always impossible. Moreover, if the manipulator is only able to add connections to the social network, then a manipulation is still impossible for some objectives, even if the manipulator has full information on the structure of the network. On the other hand, if the manipulator is able to hide some of his connections, then all objectives are susceptible to manipulation, even if the manipulator has limited information, i.e., when he is familiar with his immediate neighbours and with their neighbours.


2012 ◽  
Vol 367 (1599) ◽  
pp. 2108-2118 ◽  
Author(s):  
Louise Barrett ◽  
S. Peter Henzi ◽  
David Lusseau

Understanding human cognitive evolution, and that of the other primates, means taking sociality very seriously. For humans, this requires the recognition of the sociocultural and historical means by which human minds and selves are constructed, and how this gives rise to the reflexivity and ability to respond to novelty that characterize our species. For other, non-linguistic, primates we can answer some interesting questions by viewing social life as a feedback process, drawing on cybernetics and systems approaches and using social network neo-theory to test these ideas. Specifically, we show how social networks can be formalized as multi-dimensional objects, and use entropy measures to assess how networks respond to perturbation. We use simulations and natural ‘knock-outs’ in a free-ranging baboon troop to demonstrate that changes in interactions after social perturbations lead to a more certain social network, in which the outcomes of interactions are easier for members to predict. This new formalization of social networks provides a framework within which to predict network dynamics and evolution, helps us highlight how human and non-human social networks differ and has implications for theories of cognitive evolution.


Author(s):  
Mochamad Yudha Febrianta ◽  
Yusditira Yusditira ◽  
Sri Widianesty

Virtual Hotel Operator (VHO) trend is growing rapidly, especially in Indonesia. Two of the most popular VHO in Indonesia are OYO and RedDoorz, both have been competing to attain the first position. Both OYO and RedDoorz have their own social media marketing strategies. For example, OYO persuades other conventional hotels to collaborate and use the OYO platform in their businesses. On the other hand, RedDoorz was recorded as the most visited Virtual Hotel Operator Platform in 2019, based on the data of Konsumen Jakpat 2019. OYO and RedDoorz also utilize social media to promote their services such as Instagram and Twitter. For advertising their businesses in social media, OYO and RedDoorz often use some social media influencers or known as influencer social media marketing. Influencers should be able to effectively deliver the messages and influence people’s decisions to use the products or services they advertise. This study aims to further explore the social media marketing strategy employed by OYO and RedDoorz. The results of Social Network Analysis by using “oyoindonesia” and ‘reddoorz’ as keywords in social media Twitter showed that RedDoorz has a bigger social network and more users involved in spreading their information than OYO. On the other hand, OYO's official account on Twitter is more efficient in performing its function as marketing media.


2020 ◽  
Vol 8 (2) ◽  
pp. 117-141
Author(s):  
Alberto Rodríguez Márquez

The objective of this paper is to describe the prosodic features of the final intonation contour of minor intonational phrases (ip) and the tonemes of major intonational phrases (IP) in Mexico City’s Spanish variety. The speech data was taken from a spontaneous speech corpus made from speakers from two social networks: neighborhood and labor. Final intonation contours of ip show a predominantly rising movement. These contours are generally produced with greater length in the last syllable of the ip, which represents the most significant difference between both networks in the case of oxitone endings. On the other hand, tonemes are predominantly descendant, although the circumflex accent has an important number of cases within the data set. Tonemes produced by the neighborhood network are produced with larger length than those from the labor network.


Author(s):  
И.В. Нечта

Предложен новый метод передачи скрытых сообщений в социальных сетях на примере сети “Вконтакте”, позволяющий через структуру графа друзей пользователя внедрять секретные сообщения. Получены количественные оценки объема внедряемого сообщения в графы различного размера. Показана необходимость добавления избыточности во внедряемое сообщение. Представленный метод позволяет использовать другие графоподобные структуры социальной сети для внедрения скрытых сообщений. Purpose. This article addresses the construction of a new method for transmission of hidden messages in social networks. Methodology. The research employs methods of information theory, probability theory and mathematical statistics The Shannon entropy is used as the statistics for the analysis of an embedded message. Findings. The author proposed using the graphical structures of social networks as a container for the secret message transmission for the first time. As an example, the popular Vkontakte network is considered. The main idea of the method involves using the structure of the user’s friends graph to embed a secret message. Based on the available vertices (friends’ accounts), a complete graph is constructed, and its edges are enumerated. Each edge of the graph corresponds to one bit of the message being embedded: the bit is “1”, if the edge is present in the graph (one account in friends of the other), the bit is “0” if the edge is missing. To transfer the graph from one person to another, a key vertex is used. The specified vertex is connected by an edge with each connected component of the graph, which allows the graph to be transmitted using a single node and take into account all the vertices (including isolated ones). When retrieving a message, the key vertex and the edges connected to it are not considered. Conclusions. During the experimental research, it was shown that messages extracted from an empty container differ from the encrypted message by the probability distribution of bits. The necessity of adding redundancy to transmitted secret messages is shown with the purpose of “leveling” the statistical properties of an empty and filled container. The results of the experiment have showed that this method of steganography allows embedding a large amount of information into various social network structures represented in the form of a graph. It was noted in the paper that potentially “narrow” place of the algorithm is registration of new accounts. The restrictions imposed by the administration of some social networks for security purposes do not always allow automatic registration of new accounts, which makes the process of message embedding more difficult.


There are few studies on the macro-level dynamics of networks. These dynamics affect the whole network and concern non-local changes. Macro-level changes almost always stem from reasons outside the network. We observe this in its most typical form when the network population increases or decreases in an unusual manner. We cannot correlate such a population change with the relations of actors or the dyad, triad, or intergroup behaviors within the scope of these relations as it was the case in microo r meso-level dynamics. Sudden changes in population in a social network may“disturb” the established order and, therefore, may affect individual communicative relations. Population growth, on the other hand, might result in a revival in terms of other aspects. This chapter these macro-level dynamics.


2007 ◽  
Vol 17 (07) ◽  
pp. 2281-2288 ◽  
Author(s):  
JUYONG PARK ◽  
OSCAR CELMA ◽  
MARKUS KOPPENBERGER ◽  
PEDRO CANO ◽  
JAVIER M. BULDÚ

In this paper, we analyze two social network datasets of contemporary musicians constructed from allmusic.com (AMG), a music and artists' information database: one is the collaboration network in which two musicians are connected if they have performed or produced an album together, and the other is the similarity network in which they are connected if they were musically similar according to the music experts. We find that, while both networks exhibit typical features of social networks such as high transitivity (clustering), we find that they differ significantly in some key network features such as the degree and the betweenness distributions. We believe that this highlights the fundamental differences in the construction mechanism (self-organized collaboration and human-perceived similarity) of the new networks.


Human Affairs ◽  
2016 ◽  
Vol 26 (3) ◽  
Author(s):  
Josef Koudelka

AbstractWhen governments create refugee policies they consider several factors (security, economics, ethics, etc.). There are reasons why admitting refugees could have negative consequences (for example, security risks). On the other hand, if the recipient societies have ideals that stress the importance of helping other people, they should act according to their values. The aim of this article is to examine the concept of human dignity and show that European states should admit and help refugees because it is in accordance with their ethical values and the international agreements they have signed. This is important because when European countries hesitate to help refugees, they act not only contrary to their humane tradition, but they can harm them. The western concept of human dignity is one of the main values that stresses that each person is important—that they are equal and free.


2020 ◽  
Author(s):  
Habiba H. Drias ◽  
Yassine Drias

A study with a societal objective was carried out on people exchanging on social networks and more particularly on Twitter to observe their feelings on the COVID-19. A dataset of more than 600,000 tweets with hashtags like COVID and coronavirus posted between February 27, 2020 and March 25, 2020 was built. An exploratory treatment of the number of tweets posted by country, by language and other parameters revealed an overview of the apprehension of the pandemic around the world. A sentiment analysis was elaborated on the basis of the tweets posted in English because these constitute the great majority. On the other hand, the FP-Growth algorithm was adapted to the tweets in order to discover the most frequent patterns and its derived association rules, in order to highlight the tweeters insights relatively to COVID-19.


Sign in / Sign up

Export Citation Format

Share Document