2011
DOI: 10.1007/978-3-642-22410-2_39
|View full text |Cite
|
Sign up to set email alerts
|

A Mitigation Approach to the Privacy and Malware Threats of Social Network Services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
3

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 12 publications
0
12
0
1
Order By: Relevance
“…Perangkat smartphone saat ini menjadi sumber penting digital evidence yang relevan dengan pengguna media sosial dan aktivitas instan Messenger [13]. Namun, perbedaan antara perangkat smartphone menjadi tantangan penyidik atau investigator forensik untuk mengembangkan metode dan teknik yang disesuaikan untuk penyelidikan berbagai kasus cybercrime [11].…”
Section: Pendahuluanunclassified
“…Perangkat smartphone saat ini menjadi sumber penting digital evidence yang relevan dengan pengguna media sosial dan aktivitas instan Messenger [13]. Namun, perbedaan antara perangkat smartphone menjadi tantangan penyidik atau investigator forensik untuk mengembangkan metode dan teknik yang disesuaikan untuk penyelidikan berbagai kasus cybercrime [11].…”
Section: Pendahuluanunclassified
“…Cutillo et al [16] state some SNS's should fulfill the following privacy requirements. Basic Privacy Requirements: [16] a) End-To-End ConfidentialityAll communications are needed to be confidential and only the sender and receiver should have control of access to the data. b) Privacy-Personal information of a user should not publish to any other users apart from these explicitly mentioned by the user.…”
Section: (I)mentioning
confidence: 99%
“…The right of being left alone. Additionally Cutillo et al [12] state that an ideal SNS's should fulfill the following privacy requirements [12]:…”
Section: Requirements In Privacymentioning
confidence: 99%