Online social networking has become a part of our everyday lives, and one of the popular online social network (SN) sites on the Internet is Facebook, where users communicate with their friends, join to groups, create groups, play games, and make friends around the world. Also, the vast number of groups are created for different causes and beliefs. However, overwhelming number of groups in one category causes difficulties for users to select a right group to join. To solve this problem, we introduce group recommendation system (GRS) using combination of hierarchical clustering technique and decision tree. We believe that Facebook SN groups can be identified based on their members' profiles. Number of experiment results showed that GRS can make 73% accurate recommendation.
With Twitters growing popularity, privacy has become a major concern for users wary of sensitive information falling in the wrong hands. A typical Twitter user carries hundreds of followers -people who have subscribed to users twitter feeds. Our goal is to target followers that a Twitter user deems safe. Therefore, selecting followers with a closer relationship could help decrease the risk of sensitive information being sent to unknown people. We propose a privacy management system that helps a Twitter user restrict information to only certain followers based on the strength of their social tie. This system would incorporate two tools: the Exclusivity meter and the Twitter Response Estimator. The Exclusivity Meter employs user's activity profile to guess similarities between users. Preliminary results have indicated that similarity in time and level of activity between user and follower does suggest a stronger social tie. The Twitter Response Estimator uses a measure of prestige to gauge the probability of response. When applied to a set of followers, the estimator separates real friends from recreational followers.
Voice over IP (VoIP) technology is being extensively and rapidly deployed. The flexibility and cost efficiency are the key factors luring enterprises to transition to VoIP. Some security problems may surface with the widespread deployment of VoIP. This article presents an overview of VoIP systems and its security issues. First, we briefly describe basic VoIP architecture and its fundamental differences compared to PSTN. Next, basic VoIP protocols used for signaling and media transport, as well as defense mechanisms are described. Finally, current and potential VoIP attacks along with the approaches that have been adopted to counter the attacks are discussed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.