We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 58 results
  1. Doxing

    The most impressive attribution results are those that identify specific individuals, ideally with their real names and even photos. Objectively...
    Chapter 2020
  2. HATDO: hybrid Archimedes Tasmanian devil optimization CNN for classifying offensive comments and non-offensive comments

    The evolution of social media and online platforms created more opportunities to express one’s thoughts without any burden. This emergence paved the...

    B. Aarthi, Balika J. Chelliah in Neural Computing and Applications
    Article 22 June 2023
  3. Enhancing cyberbullying detection: a comparative study of ensemble CNN–SVM and BERT models

    Technological improvements have increased the number of people who use online social networking sites, resulting in an increase in cyberbullying....

    Hiteshi Saini, Himashri Mehra, ... Amita Dev in Social Network Analysis and Mining
    Article 02 December 2023
  4. Cyberstalking in Nigeria: An Exploratory Study of Section 24 of the Nigerian Cybercrimes (Prohibition, Prevention, etc.) (Amendment) Act, 2024

    The increase in internet use, interconnectivity, and affordability of data have intensified online harms, including cyberstalking on social media...

    Article 01 July 2024
  5. Privacy Risks in German Patient Forums: A NER-Based Approach to Enrich Digital Twins

    The online sharing of personal health data by individuals has raised privacy concerns. This paper presents a Named Entity Recognition (NER)-based...
    Sergej Schultenkämper, Frederik Simon Bäumer in Information and Software Technologies
    Conference paper 2024
  6. Research with User-Generated Book Review Data: Legal and Ethical Pitfalls and Contextualized Mitigations

    The growing quantity of user-generated book reviews has opened up unprecedented opportunities for empirical research on books, reading, and...
    Yuerong Hu, Glen Layne-Worthey, ... Jana Diesner in Information for a Better World: Normality, Virtuality, Physicality, Inclusivity
    Conference paper 2023
  7. A classification of Antifa Twitter accounts based on social network map** and linguistic analysis

    Where machine learning and other quantitative methods have been used for classification purposes in hel** researchers manually identify extremist...

    Article 29 November 2021
  8. Personenbezogene Recherchen – Doxing

    Die beeindruckendsten Attributions-Ergebnisse sind solche, die konkrete Personen identifizieren, im Idealfall mit ihren Klarnamen und sogar Fotos....
    Timo Steffens in Auf der Spur der Hacker
    Chapter 2018
  9. “Hello, Fellow Villager!”: Perceptions and Impact of Displaying Users’ Locations on Weibo

    In April 2022, Sina Weibo began to display users’ coarse location for the stated purpose of regulating their online community. However, this raised...
    Ying Ma, Qiushi Zhou, ... Jorge Goncalves in Human-Computer Interaction – INTERACT 2023
    Conference paper 2023
  10. Social Web Cyber-Sicherheit

    In diesem Kapitel werden einige Themen des Social Webs mit der besonderen Sichtweise auf die Cyber-Sicherheit dargestellt und diskutiert. Zu...
    Norbert Pohlmann in Cyber-Sicherheit
    Chapter 2022
  11. Safety

    The previous chapter looked at fairness and explained how it relates to responsible AI. This chapter looks at AI safety and explains how it...
    Chapter 2023
  12. The worst mistake 2.0? The digital revolution and the consequences of innovation

    The invention of agriculture 12,000 years ago has been called the worst mistake in human history. Alongside the social, political, and technological...

    Matthew O’Lemmon in AI & SOCIETY
    Article 28 November 2022
  13. Cyber Security Issues and Challenges on Non-fungible Tokens

    Blockchain Technology helps buy and sell digital assets known as Non-Fungible Tokens (NFT). It is an asset that is not fungible. It is a different...
    Conference paper 2024
  14. Make a Difference in a Different Way: Twitter Bot Creators and Wikipedia Transparency.

    Software robots (bots) are a major part of contemporary Internet culture, employed by businesses for customer service, artists for digital...

    Randall M. Livingstone in Computer Supported Cooperative Work (CSCW)
    Article 07 October 2021
  15. Structured Knowledge Extraction for Digital Twins: Leveraging LLMs to Analyze Tweets

    This paper concentrates on the extraction of pertinent information from unstructured data, specifically analyzing textual content disseminated by...
    Sergej Schultenkämper, Frederik Simon Bäumer in Innovations for Community Services
    Conference paper 2024
  16. Positioning Diplomacy Within a Strategic Response to the Cyber Conflict Threat

    Background. Nation states unleash cyber attacks targeting other nation states (e.g. WannaCry, SolarWinds), termed “offensive cyber operations”. When...
    Karen Renaud, Amel Attatfa, Tony Craig in Socio-Technical Aspects in Security
    Conference paper 2022
  17. On unique framework-based implementation of a novel image watermarking scheme

    To prevail over the trade-offs among the three major parameters, i.e., data transparency, robustness, and hiding capacity, is an enduring crisis in...

    Anirban Saha, Subhrajit Sinha Roy, ... Avik Chattopadhyay in Multimedia Tools and Applications
    Article 29 February 2024
  18. Understanding Interpretability: Explainable AI Approaches for Hate Speech Classifiers

    Cyberbullying and hate speech are two of the most significant problems in today’s cyberspace. Automated artificial intelligence models might be used...
    Sargam Yadav, Abhishek Kaushik, Kevin McDaid in Explainable Artificial Intelligence
    Conference paper 2023
  19. The Only Link You’ll Ever Need: How Social Media Reference Landing Pages Speed Up Profile Matching

    The Web is characterized by user interaction on Online Social Networks, the exchange of content on a large scale, and the presentation of one’s own...
    Sergej Denisov, Frederik S. Bäumer in Information and Software Technologies
    Conference paper 2022
  20. Cyber Threat Analysis and Mitigation in Emerging Information Technology (IT) Trends

    For the information technology sector, cybersecurity is essential. One of the main issues in the modern world is sending information from one system...
    Mohsin Imam, Mohd Anas Wajid, ... Akhtar Jamil in Emerging Trends and Applications in Artificial Intelligence
    Conference paper 2024
Did you find what you were looking for? Share feedback.