Challenges in protecting personnel information in social network space

作者: Meghna Chaudhary , Harish Kumar

DOI: 10.1109/ETNCC.2015.7184816

关键词: Political scienceComputer securityThe InternetInformation privacyInternet privacySocial mediaAsynchronous communicationSocial networkPrivacy softwareSociology of the InternetSocial media optimization

摘要: Social networking sites have become the lifeline for communication among individuals. network is a graph between actors. Actors are represented as nodes. The links nodes represent relationship one form of social media technology. technology provides opportunity synchronous and asynchronous communication. Various such Facebook Twitter allow users to communicate discuss their opinions. has benefits disadvantages. This paper elucidates various cyber issues cyber-bullying, Internet banging cyber-attacks. different methods used by attackers been discussed. It includes review privacy which arise due lack knowledge skills or ignorance actors graph. Finally, solutions attacks discussed in this paper.

参考文章(29)
Frank Nagle, Privacy Breach Analysis in Social Networks Mining Social Networks and Security Informatics. pp. 63- 77 ,(2013) , 10.1007/978-94-007-6359-3_4
Elena Zheleva, Lise Getoor, Preserving the privacy of sensitive relationships in graph data knowledge discovery and data mining. pp. 153- 171 ,(2007) , 10.1007/978-3-540-78478-4_9
Elena Zheleva, Lise Getoor, Privacy in Social Networks: A Survey Social Network Data Analytics. pp. 277- 306 ,(2011) , 10.1007/978-1-4419-8462-3_10
Julian Jang-Jaccard, Surya Nepal, None, A survey of emerging threats in cybersecurity Journal of Computer and System Sciences. ,vol. 80, pp. 973- 993 ,(2014) , 10.1016/J.JCSS.2014.02.005
Javed Ahmed, Zubair Ahmed Shaikh, Privacy issues in social networking platforms: comparative study of facebook developers platform and opensocial International Conference on Computer Networks and Information Technology. pp. 179- 183 ,(2011) , 10.1109/ICCNIT.2011.6020927
Sonia Jahid, Shirin Nilizadeh, Prateek Mittal, Nikita Borisov, Apu Kapadia, DECENT: A decentralized architecture for enforcing privacy in online social networks pervasive computing and communications. pp. 326- 332 ,(2012) , 10.1109/PERCOMW.2012.6197504
Nader Yahya Alkeinay, Norita Md. Norwawi, User Oriented Privacy Model for Social Networks Procedia - Social and Behavioral Sciences. ,vol. 129, pp. 191- 197 ,(2014) , 10.1016/J.SBSPRO.2014.03.666
Paul Best, Roger Manktelow, Brian Taylor, Online communication, social media and adolescent wellbeing: A systematic narrative review Children and Youth Services Review. ,vol. 41, pp. 27- 36 ,(2014) , 10.1016/J.CHILDYOUTH.2014.03.001
Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, A logical framework for privacy-preserving social network publication ☆ Journal of Applied Logic. ,vol. 12, pp. 151- 174 ,(2014) , 10.1016/J.JAL.2013.12.001
Yong Jin Park, S. Mo Jang, Understanding privacy knowledge and skill in mobile communication Computers in Human Behavior. ,vol. 38, pp. 296- 303 ,(2014) , 10.1016/J.CHB.2014.05.041