Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Colluding Attacks (1)
- Colluding Targeted Reconnaissance Attack (1)
- Communication technology and new media (1)
- Community Detection (1)
- Crowdsourcing (1)
-
- Cybersecurity (1)
- Dialogic communication theory (1)
- Gender and sexuality (1)
- Identity Clone Attack (1)
- Microblog Dialogic Communication (1)
- Online Social Networks (1)
- Science and technology studies (1)
- Sentiment analysis (1)
- Social Network Analysis (1)
- Social and cultural anthropology (1)
- Threats and Solutions (1)
- Twitter (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Social and Behavioral Sciences
Twitter Activity Of Urban And Rural Colleges: A Sentiment Analysis Using The Dialogic Loop, Eugene H. Pons
Twitter Activity Of Urban And Rural Colleges: A Sentiment Analysis Using The Dialogic Loop, Eugene H. Pons
FIU Electronic Theses and Dissertations
The purpose of the present study is to ascertain if colleges are achieving their ultimate communication goals of maintaining and attracting students through their microblogging activity, which according to Dialogic Loop Theory, is directly correlated to the use of positive and negative sentiment. The study focused on a cross-section of urban and rural community colleges within the United States to identify the sentiment score of their microblogging activity. The study included a content analysis on the Twitter activity of these colleges. A data-mining process was employed to collect a census of the tweets associated with these colleges. Further processing was …
Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua
Mitigating Colluding Attacks In Online Social Networks And Crowdsourcing Platforms, Georges Arsene K. Kamhoua
FIU Electronic Theses and Dissertations
Online Social Networks (OSNs) have created new ways for people to communicate, and for companies to engage their customers -- with these new avenues for communication come new vulnerabilities that can be exploited by attackers. This dissertation aims to investigate two attack models: Identity Clone Attacks (ICA) and Reconnaissance Attacks (RA). During an ICA, attackers impersonate users in a network and attempt to infiltrate social circles and extract confidential information. In an RA, attackers gather information on a target's resources, employees, and relationships with other entities over public venues such as OSNs and company websites. This was made easier for …
Love From The Machine: Technosexualities And The Desire For Machinic Bodies, Ann-Renee Clark
Love From The Machine: Technosexualities And The Desire For Machinic Bodies, Ann-Renee Clark
FIU Electronic Theses and Dissertations
This dissertation explores the dimensions and practices of "technosexualities" - human desires for machinic bodies. For the purposes of this project, technosexualities are defined as sexual and/or other intimate desires for technologically enhanced or constructed humanoid bodies ("machinic bodies") or the desire to be such a machinic body. A machinic body may be mechanical (robotic) and/or digital, techno-biological (as per biological computing and/or a laboratory-“grown” or built body), or “cyborg” (cybernetic organism, a partially technologically-modified, partially biological body.) Rather than interpreting technosexuals as troubled or disturbed “fetishists” who are attracted to the unnatural, or imposing suppositions of feelings of impotence …
Security Starts At Your Door: Social Media, Racial Inequality, And The Rise Of Video Sousveillance In Urban Environments, Bridgett Zayas
Security Starts At Your Door: Social Media, Racial Inequality, And The Rise Of Video Sousveillance In Urban Environments, Bridgett Zayas
Undergraduate Research at FIU (URFIU) Conference
The rise of consumer-level surveillance cameras and home security systems in suburban neighborhoods have given rise to new forms of sousveillance (the inverse of surveillance, describing a bottom-up approach to watching) technology like Amazon’s Ring and its corresponding social platform application, Neighbors. The app is meant to facilitate collaboration and safety, as Ring owners upload videos taken from their camera and communicate with users in the same or neighboring communities and law enforcement. Although there are millions of active users, as well as an increase in interest from law enforcement, there is little research examining this new form of sousveillance …