ESP Journal of Engineering & Technology Advancements |
© 2023 by ESP JETA |
Volume 3 Issue 2 |
Year of Publication : 2023 |
Authors : Saptarshi Kumar Sarkar, Amitava Podder, Piyal Roy |
:10.56472/25832646/JETA-V3I4P105 |
Saptarshi Kumar Sarkar, Amitava Podder, Piyal Roy, 2023. "An Analysis of the Privacy and Security Related Problem with Social Networks" ESP Journal of Engineering & Technology Advancements 3(2): 39-45.
Social networking is becoming more and more important as a result of the development in online communication over the last few years. Computer network operation, information flow patterns in societies, and emergent behaviour of physical and biological systems can all be studied using social network analysis. Social networks are now widely used, which has made it simpler for people to communicate with one another and share data online. However, this greater connection has additionally made it simpler for attackers and other bad actors to access user content and private data without authorization. In this paper, we will examine the various ways in which illegal access to user material and privacy breaches occur on social networks and explore the measures that can be taken to prevent them.
[1] X. Li, D. Zeng, W. Mao and F. Wang. Online Communities: A Social Computing Perspective. Intelligence and Security Informatics 2008 Workshops, 2008, pp. 355-365, doi:10.1007/978-3-540-69304-8.
[2] Obar, J.A.; Wildman, S. Social media definition and the governance challenge: An introduction to the special issue. Telecommun. Policy 2015, 39, 745–750.
[3] Kaplan, A.M.; Haenlein, M. Users of the world, unite! The challenges and opportunities of Social Media. Bus. Horiz. 2010, 53, 59–68.
[4] Taddicken, M. The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure. J. Comput.-Mediat. Commun. 2014, 19, 248–273.
[5] Egele, M.; Stringhini, G.; Kruegel, C.; Vigna, G. Towards detecting compromised accounts on social networks. IEEE Trans. Dependable Secure Comput. 2017, 14, 447–460.
[6] Grier, C.; Thomas, K.; Paxson, V.; Zhang, M. @spam: The underground on 140 characters or less. In Proceedings of the 17th ACM conference on Computer and Communications Security, Chicago, IL, USA, 4–8 October 2010; pp. 27–37.
[7] Gao, H.; Hu, J.; Wilson, C.; Li, Z.; Chen, Y.; Zhao, B.Y. Detecting and characterizing social spam campaigns. In Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, Melbourne, Australia, 1–3 November 2010; pp. 35–47.
[8] Thomas, K.; Grier, C.; Ma, J.; Paxson, V.; Song, D. Design and evaluation of a real-time URL spam filtering service. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, 22–25 May 2011; pp. 447–462.
[9] Dvorak, J.C. LinkedIn Account Hacked. Available online: https://www.pcmag.com/article2/0,2817, 2375983,00.asp (accessed on 1 November 2018).
[10] Miller, S. Sen. Grassley’s Twitter Account Hacked by SOPA Protesters. Available online: https://abcnews. go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/ (accessed on 1 November 2018).
[11] Vishwanath, A. Getting phished on social media. Decis. Support Syst. 2017, 103, 70–81.
[12] Baltazar, J.; Costoya, J.; Flores, R. The Real Face of Koobface: The Largest Web 2.0 Botnet Explained. Trend Micro Threat Research. 2009. Available online: https://www.trendmicro.de/cloud-content/us/pdfs/ security-intelligence/white-papers/wp_the-real-face-of-koobface.pdf (accessed on 21 October 2018).
[13] Humphreys, L. Mobile social networks and social practice: A case study of Dodgeball. J. Comput.-Mediat. Commun. 2007, 13, 341–360.
[14] Zhang, W.; Al Amin, H. Privacy and security concern of online social networks from user perspective. In Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP2015), ESEO, Angers, Loire Valley, France, 9–11 February 2015; pp. 246–253.
Social Networking, OSN, Privacy, Security, Classical Threat, Modern Threat.