Analyzing and securing social networks:
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of t...
Gespeichert in:
Beteiligte Personen: | , , , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
Auerbach
2016
|
Ausgabe: | 1st. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781482243284/?ar |
Zusammenfassung: | Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions. |
Beschreibung: | Includes bibliographical references and index. - CIP data; item not viewed |
Umfang: | 1 Online-Ressource illustrations (black and white) |
ISBN: | 9781482243284 1482243288 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-07713043X | ||
003 | DE-627-1 | ||
005 | 20240228120303.0 | ||
007 | cr uuu---uuuuu | ||
008 | 220322s2016 xx |||||o 00| ||eng c | ||
020 | |a 9781482243284 |c PDF ebook |9 978-1-4822-4328-4 | ||
020 | |a 1482243288 |c PDF ebook |9 1-4822-4328-8 | ||
035 | |a (DE-627-1)07713043X | ||
035 | |a (DE-599)KEP07713043X | ||
035 | |a (ORHE)9781482243284 | ||
035 | |a (DE-627-1)07713043X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 006.754 |2 23 | |
100 | 1 | |a Thuraisingham, Bhavani M. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Analyzing and securing social networks |c Bhavani Thuraisingham [and five others] |
250 | |a 1st. | ||
264 | 1 | |a Boca Raton |b Auerbach |c 2016 | |
300 | |a 1 Online-Ressource |b illustrations (black and white) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - CIP data; item not viewed | ||
520 | |a Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions. | ||
650 | 0 | |a Online social networks |x Security measures | |
650 | 0 | |a Web usage mining | |
650 | 0 | |a Data protection | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Privacy, Right of | |
650 | 4 | |a Réseaux sociaux (Internet) ; Sécurité ; Mesures | |
650 | 4 | |a Analyse du comportement des internautes | |
650 | 4 | |a Protection de l'information (Informatique) | |
650 | 4 | |a Computer crimes ; Prevention |0 (OCoLC)fst00872068 | |
650 | 4 | |a Data protection |0 (OCoLC)fst00887958 | |
650 | 4 | |a Privacy, Right of |0 (OCoLC)fst01077444 | |
650 | 4 | |a Web usage mining |0 (OCoLC)fst01173271 | |
700 | 1 | |a Abrol, Satyen |e VerfasserIn |4 aut | |
700 | 1 | |a Heatherly, Raymond |e VerfasserIn |4 aut | |
700 | 1 | |a Kantarcioglu, Murat |e VerfasserIn |4 aut | |
700 | 1 | |a Khadilkar, Vaibhav |e VerfasserIn |4 aut | |
700 | 1 | |a Khan, Latifur |e VerfasserIn |4 aut | |
776 | 1 | |z 9781482243277 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781482243277 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781482243284/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-07713043X |
---|---|
_version_ | 1821494823107952640 |
adam_text | |
any_adam_object | |
author | Thuraisingham, Bhavani M. Abrol, Satyen Heatherly, Raymond Kantarcioglu, Murat Khadilkar, Vaibhav Khan, Latifur |
author_facet | Thuraisingham, Bhavani M. Abrol, Satyen Heatherly, Raymond Kantarcioglu, Murat Khadilkar, Vaibhav Khan, Latifur |
author_role | aut aut aut aut aut aut |
author_sort | Thuraisingham, Bhavani M. |
author_variant | b m t bm bmt s a sa r h rh m k mk v k vk l k lk |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)07713043X (DE-599)KEP07713043X (ORHE)9781482243284 |
dewey-full | 006.754 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.754 |
dewey-search | 006.754 |
dewey-sort | 16.754 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03921cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-07713043X</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120303.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">220322s2016 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781482243284</subfield><subfield code="c">PDF ebook</subfield><subfield code="9">978-1-4822-4328-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1482243288</subfield><subfield code="c">PDF ebook</subfield><subfield code="9">1-4822-4328-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07713043X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP07713043X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781482243284</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)07713043X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.754</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Thuraisingham, Bhavani M.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Analyzing and securing social networks</subfield><subfield code="c">Bhavani Thuraisingham [and five others]</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">Auerbach</subfield><subfield code="c">2016</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations (black and white)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - CIP data; item not viewed</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Web usage mining</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux sociaux (Internet) ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Analyse du comportement des internautes</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield><subfield code="0">(OCoLC)fst00872068</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="0">(OCoLC)fst00887958</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield><subfield code="0">(OCoLC)fst01077444</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web usage mining</subfield><subfield code="0">(OCoLC)fst01173271</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abrol, Satyen</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heatherly, Raymond</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantarcioglu, Murat</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khadilkar, Vaibhav</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Khan, Latifur</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781482243277</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781482243277</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781482243284/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-07713043X |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:30Z |
institution | BVB |
isbn | 9781482243284 1482243288 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations (black and white) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Auerbach |
record_format | marc |
spelling | Thuraisingham, Bhavani M. VerfasserIn aut Analyzing and securing social networks Bhavani Thuraisingham [and five others] 1st. Boca Raton Auerbach 2016 1 Online-Ressource illustrations (black and white) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - CIP data; item not viewed Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions. Online social networks Security measures Web usage mining Data protection Computer crimes Prevention Privacy, Right of Réseaux sociaux (Internet) ; Sécurité ; Mesures Analyse du comportement des internautes Protection de l'information (Informatique) Computer crimes ; Prevention (OCoLC)fst00872068 Data protection (OCoLC)fst00887958 Privacy, Right of (OCoLC)fst01077444 Web usage mining (OCoLC)fst01173271 Abrol, Satyen VerfasserIn aut Heatherly, Raymond VerfasserIn aut Kantarcioglu, Murat VerfasserIn aut Khadilkar, Vaibhav VerfasserIn aut Khan, Latifur VerfasserIn aut 9781482243277 Erscheint auch als Druck-Ausgabe 9781482243277 |
spellingShingle | Thuraisingham, Bhavani M. Abrol, Satyen Heatherly, Raymond Kantarcioglu, Murat Khadilkar, Vaibhav Khan, Latifur Analyzing and securing social networks Online social networks Security measures Web usage mining Data protection Computer crimes Prevention Privacy, Right of Réseaux sociaux (Internet) ; Sécurité ; Mesures Analyse du comportement des internautes Protection de l'information (Informatique) Computer crimes ; Prevention (OCoLC)fst00872068 Data protection (OCoLC)fst00887958 Privacy, Right of (OCoLC)fst01077444 Web usage mining (OCoLC)fst01173271 |
subject_GND | (OCoLC)fst00872068 (OCoLC)fst00887958 (OCoLC)fst01077444 (OCoLC)fst01173271 |
title | Analyzing and securing social networks |
title_auth | Analyzing and securing social networks |
title_exact_search | Analyzing and securing social networks |
title_full | Analyzing and securing social networks Bhavani Thuraisingham [and five others] |
title_fullStr | Analyzing and securing social networks Bhavani Thuraisingham [and five others] |
title_full_unstemmed | Analyzing and securing social networks Bhavani Thuraisingham [and five others] |
title_short | Analyzing and securing social networks |
title_sort | analyzing and securing social networks |
topic | Online social networks Security measures Web usage mining Data protection Computer crimes Prevention Privacy, Right of Réseaux sociaux (Internet) ; Sécurité ; Mesures Analyse du comportement des internautes Protection de l'information (Informatique) Computer crimes ; Prevention (OCoLC)fst00872068 Data protection (OCoLC)fst00887958 Privacy, Right of (OCoLC)fst01077444 Web usage mining (OCoLC)fst01173271 |
topic_facet | Online social networks Security measures Web usage mining Data protection Computer crimes Prevention Privacy, Right of Réseaux sociaux (Internet) ; Sécurité ; Mesures Analyse du comportement des internautes Protection de l'information (Informatique) Computer crimes ; Prevention |
work_keys_str_mv | AT thuraisinghambhavanim analyzingandsecuringsocialnetworks AT abrolsatyen analyzingandsecuringsocialnetworks AT heatherlyraymond analyzingandsecuringsocialnetworks AT kantarcioglumurat analyzingandsecuringsocialnetworks AT khadilkarvaibhav analyzingandsecuringsocialnetworks AT khanlatifur analyzingandsecuringsocialnetworks |