Data Protection

Article

The Means To Justify The End: How The Way In Which Decisions To Intervene Are Communicated To Users

Cyber harassment does not only have harmful effects for social network sites, because victims tend to exit the service (Avery 2010; Martin and Smith 2008), but the emotional distress brought on by Read More »

Date: 2013
Author: Tom van Laer
Contributor: eb™ Research Team
Article

What Hiding Reveals: Ironic Effects Of Withholding Information

Imagine being asked about your recreational drug habits by your employer, and realizing that in order to be completely truthful you’ll have to admit that you have occasionally indulged. In four Read More »

Date: 2013
Author: Leslie K. John, Michael I. Norton
Contributor: eb™ Research Team
Article

DISTRIBUTED DENIAL OF SERVICE (DDOS): EXPLORING ATTACKS AND PREVENTION METHODS FOR IOT FRAMEWORK

The Internet of Things (IoT) has become increasingly popular in recent decades due to its ability to connect various smart devices over the Internet, such as sensors, monitoring systems, and advanced Read More »

Date: 01/2025
Author: Ritesh Kumar Thakur, Prakash Singh
Contributor: eb™ Research Team
Article

The Precarious Citizen. Control And Value In The Digital Age

In what follows I aim to highlight the issues of value and control in socialisation processes facilitated by the new social media, by interrogating the nexus of leisure and work, surveillance and Read More »

Date: 2016
Author: Katharine Sarikakis
Contributor: eb™ Research Team
Article

Analysis Of User Susceptibility To Email Phishing

In an organization, most employees tend to be unaware of their weakness in terms of cyber security which can affect the whole organization. The personality traits, general life experiences, and Read More »

Date: 03/24/2022
Author: Shian A. Guilalas
Contributor: eb™ Research Team
CATEGORY