Trouvez-moi sur

  • ORCID
  • Research Gate
  • Google Scholar
  • LinkedIn
  • Twitter
  • Instagram

Karina Sokolova

Enseignant-chercheur

Titulaire d'un diplôme d’ingénieur et d'un doctorat en sécurité mobile, j'occupe actuellement le poste de professeur associé à Paris School of Business. Mes travaux de recherche s’inscrivent dans les domaines de l'analyse des réseaux sociaux, du respect de la vie privée et, plus généralement, du comportement des utilisateurs des nouvelles technologies. J’interviens dans plusieurs établissements sur les disciplines de la cybersécurité, du développement sous Android et la visualisation des données. Je suis membre du comité d’organisation d'évènements créatifs autour des nouvelles technologies permettant aux étudiants de créer les prototypes de produits innovants tels que des applications mobiles, des objectés connectés et des voicebots. Je suis l’auteure de multiples ouvrages et articles scientifiques.

Derniers ouvrages

Prison numérique

Mise en lumière de quelques nuances sombres de notre société numérique

L'Harmattan

En à peine plus d'une génération, le numérique a pris une ampleur exceptionnelle. Le web, reflet de notre société sous cet aspect, est dit en danger par l'un de ses créateurs : Timothy John Berners-Lee. La désinformation, l'économie de l'attention, la surpersonnalisation, l'abus de biais cognitifs, la bulle de filtres et autres formes de manipulations font partie des nombreux sujets d'inquiétude. Ces dernières années, les acteurs clés du digital (Facebook, Google, Netflix, Twitter) — par le biais de certains repentis — ont mis en lumière, les pratiques sombres de leurs entreprises. Ils ont peu à peu crié leur inquiétude sur ce qu'ils ont fait du web. Cet ouvrage présente ces pratiques et propose un regard pour encourager une prise de conscience et un changement des codes.

La cybersécurité

Collection : #Digital

Studyrama

Pourquoi un manuel sur la cybersécurité? Parce que nous sommes tous concernés. Environ 3 personnes sur 5 ont déja subi une cyberattaque : vol de mot de passe, perte d'accès ou activité suspecte sur un compte, transactions non légitimes sur une carte de crédit, perte de données personnelles sou sensibles, comportement anormal de son ordinateur ou de son smartphone.

La cybersécurité ? De quoi parle-t-on ? Pourquoi faut-il se protéger ? De qui ? Comment ? Cet ouvrage a pour but d'apporter les informations nécessaires à une première approche du sujet. Au cours de votre lecture vous découvrirez le contrôle d'accès, l'ingénierie sociale, les logiciels malveillants, les communications sécurisées, la vulnérabilité du web, la sécurité mobile, le respect de la vie privée, les nouvelles technologies, et la cybersécurité en entreprise.

Quelques publications scientifiques

Karina Sokolova, Hajer Kefi

Instagram and YouTube bloggers promote it, why should I buy? How credibility and parasocial interaction influence purchase intentions

Journal of Retailing and Consumer Services, Volume 53, 2020, ISSN 0969-6989

https://doi.org/10.1016/j.jretconser.2019.01.011.

Abstract: Nowadays social network influencers play an important role in marketing by introducing products to their audience. In this article, we investigate the persuasion cues related to beauty and fashion influencers present on YouTube and Instagram. More precisely, we investigate how the para-social interaction (PSI) the audience creates with the online influencer, along with their perceived credibility, are related to the purchase intention and how they are, in turn, related to the social and physical attractiveness and attitude homophily. We base our research on four beauty influencers popular in France and control our results by the age of the participants and by the influencer. We find that attitude homophily is positively related to PSI but, surprisingly, the physical attractiveness shows negative relationship or no evidence of relationship. Both credibility of the influencers and PSI exhibit significant and positive relationships to purchase intention.

Charles Perez, Karina Sokolova, Malick Konate,
Digital social capital and performance of initial coin offerings,
Technological Forecasting and Social Change, Volume 152, 2020, ISSN 0040-1625,
https://doi.org/10.1016/j.techfore.2019.119888.

Abstract: The Initial Coin Offering (ICO) has emerged as an original way for companies to leverage funding. In this study, we analyze 537 companies that chose the ICO model in 2017 and investigate how their digital social capital is related to the rank of the ICO based on the market capitalization. The goal of this work is to better understand the role of digital social capital in ICO success. Multiple facets of digital presence are analyzed, such as website, ICO activity on social networks like Twitter, the community built and the activeness of the community. We apply an exploratory factor analysis to leverage the main factors that can be used as latent variables, and build an original research model. Structural equation modelling is used for model evaluation and hypothesis testing. Curvilinear analyses allow us to obtain a finer vision of our results. We also verify the robustness of our results in predicting the ICO rank further in time. Our results suggest that social capital is indicative of the ICO performance. The website audience is found to be the most predictive. However, the audience and the centrality of an ICO in the community seems less important than the activeness of an ICO and of the related community on social networks.

Karina Sokolova, Charles Perez, Marc Lemercier,
Android application classification and anomaly detection with graph-based permission patterns,
Decision Support Systems,
Volume 93, 2017, Pages 62-76, ISSN 0167-9236,
https://doi.org/10.1016/j.dss.2016.09.006.

Abstract: Android is one of the mobile market leaders, offering more than a million applications on Google Play store. Google checks the application for known malware, but applications abusively collecting users' data and requiring access to sensitive services not related to functionalities are still present on the market. A permission system is a user-centric security solution against abusive applications and malware that has been unsuccessful: users are incapable of understanding and judging the permissions required by each application and often ignore on-installation warnings. State-of-the-art shows that the current permission system is inappropriate for end-users. However, Android permission lists do provide information about the application's behavior and may be suitable for automatic application analysis. Identifying key permissions for functionalities and expected permission requests can help leverage abnormal application behavior and provide a simpler risk warning for users. Applications with similar functionalities are grouped into categories on Google Play and this work therefore analyzes permission requests by category. In this study, we propose a methodology to characterize normal behavior for each category of applications, highlighting expected permission requests. The co-required permissions are modeled as a graph and the category patterns and central permissions are obtained using graph analysis metrics. The obtained patterns are evaluated by the performance of the application classification into categories that allow choosing the best graph metrics representing categories. Finally, this study proposes a privacy score and a risk warning threshold based on the best metrics. The efficiency of the proposed methodology was tested on a set of 9512 applications collected from Google Play and a set of malware.

Livrets d'apprentissage

Learning by doing : le monde sous toutes ses formes

en collaboration avec Charles Perez

Learning by doing : un monde en réseau
Learning by doing : un monde connecté
Learning by doing : un monde de données
Capture d’écran 2021-04-05 à 12.22.46.
Learning by doing : réussir son mémoire