$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Privacy and Security Issues in Online Social Networks 원문보기

Future internet, v.10 no.12, 2018년, pp.114 -   

Ali, Shaukat (Department of Computer Science, Islamia College University, Peshawar 25120, Pakistan) ,  Islam, Naveed (Department of Computer Science, Islamia College University, Peshawar 25120, Pakistan) ,  Rauf, Azhar (Department of Computer Science, University of Peshawar, Peshawar 25120, Pakistan) ,  Din, Ikram Ud (Department of Information Technology, The University of Haripur, Haripur 22620, Pakistan) ,  Guizani, Mohsen (Computer Science and Engineering Department, Qatar University, Doha 2713, Qatar) ,  Rodrigues, Joel J. P. C. (Post-graduation, National Institute of Telecommunications (Inatel), 37540-000 Santa Rita do Sapucaí)

Abstract AI-Helper 아이콘AI-Helper

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN ha...

참고문헌 (57)

  1. Boyd Social network sites: Definition, history, and scholarship J. Comput.-Mediat. Commun. 2007 10.1111/j.1083-6101.2007.00393.x 13 210 

  2. Obar Social media definition and the governance challenge: An introduction to the special issue Telecommun. Policy 2015 10.1016/j.telpol.2015.07.014 39 745 

  3. Kaplan Users of the world, unite! The challenges and opportunities of Social Media Bus. Horiz. 2010 10.1016/j.bushor.2009.09.003 53 59 

  4. 10.23919/ISTAFRICA.2017.8102311 Shozi, N.A., and Mtsweni, J. (June, January 30). Big data privacy in social media sites. Proceedings of the 2017 IST-Africa Week Conference (IST-Africa), Windhoek, Namibia, Southern Africa. 

  5. Nissenbaum Privacy as Contextual Integrity Wash. L. Rev. 2004 79 101 

  6. Davison To Screen or Not to Screen? Using the Internet for Selection Decisions Empl. Responsib. Rights J. 2012 10.1007/s10672-011-9178-y 24 1 

  7. Taddicken The ‘Privacy Paradox’ in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure J. Comput.-Mediat. Commun. 2014 10.1111/jcc4.12052 19 248 

  8. Marwick Networked privacy: How teenagers negotiate context in social media New Media Soci. 2014 10.1177/1461444814543995 16 1051 

  9. Ashtari I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy J. Inf. Priv. Secur. 2013 9 80 

  10. Fire Online social networks: Threats and solutions IEEE Commun. Surv. Tutor. 2014 10.1109/COMST.2014.2321628 16 2019 

  11. Heymann Fighting spam on social web sites: A survey of approaches and future challenges IEEE Internet Comput. 2007 10.1109/MIC.2007.125 11 36 

  12. Everett Social media: Opportunity or risk? Comput. Fraud Secur. 2010 2010 8 

  13. 10.1145/2947626.2947637 Alarm, S., and El-Khatib, K. (2016, January 20-22). Phishing Susceptibility Detection through Social Media Analytics. Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA. 

  14. Nithya A survey on detection and prevention of cross-site scripting attack Int. J. Secur. Appl. 2015 9 139 

  15. Baltazar, J., Costoya, J., and Flores, R. (2018, October 21). The Real Face of Koobface: The Largest Web 2.0 Botnet Explained. Available online: https://www.trendmicro.de/cloud-content/us/pdfs/security-intelligence/white-papers/wp_the-real-face-of-koobface.pdf. 

  16. 10.1109/WIW.2016.014 Alghamdi, B., Watson, J., and Xu, Y. (2016, January 13-16). Toward detecting malicious links in online social networks through user behavior. Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence Workshops, Omaha, NE, USA. 

  17. Protalinski, E. (2018, October 21). Chinese Spies Used Fake Facebook Profile to Friend Nato Officials. Available online: https://www.zdnet.com/article/chinese-spies-used-fake-facebook-profile-to-friend-nato-officials/. 

  18. Dvorak, J.C. (2018, November 01). LinkedIn Account Hacked. Available online: https://www.pcmag.com/article2/0,2817,2375983,00.asp. 

  19. Miller, S. (2018, November 01). Sen. Grassley’s Twitter Account Hacked by SOPA Protesters. Available online: https://abcnews.go.com/blogs/politics/2012/01/sen-grassleys-twitter-account-hacked-by-sopa-protesters/. 

  20. Vishwanath Getting phished on social media Decis. Support Syst. 2017 10.1016/j.dss.2017.09.004 103 70 

  21. Fire Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies Human J. 2012 1 26 

  22. Egele Towards detecting compromised accounts on social networks IEEE Trans. Dependable Secure Comput. 2017 10.1109/TDSC.2015.2479616 14 447 

  23. 10.1145/1866307.1866311 Grier, C., Thomas, K., Paxson, V., and Zhang, M. (2010, January 4-8). @spam: The underground on 140 characters or less. Proceedings of the 17th ACM conference on Computer and Communications Security, Chicago, IL, USA. 

  24. 10.1145/1879141.1879147 Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., and Zhao, B.Y. (2010, January 1-3). Detecting and characterizing social spam campaigns. Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, Melbourne, Australia. 

  25. 10.1109/SP.2011.25 Thomas, K., Grier, C., Ma, J., Paxson, V., and Song, D. (2011, January 22-25). Design and evaluation of a real-time URL spam filtering service. Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, USA. 

  26. Gao, H., Chen, Y., Lee, K., Palsetia, D., and Choudhary, A.N. (2012, January 5-8). Towards Online Spam Filtering in Social Networks. Proceedings of the 19th Annual Network & Distributed System Security Symposium, San Diego, CA, USA. 

  27. Gupta Cross-Site Scripting (XSS) attacks and defense mechanisms: Classification and state-of-the-art Int. J. Syst. Assur. Eng. Manag. 2017 10.1007/s13198-015-0376-0 8 512 

  28. Faghani A study of XSS worm propagation and detection mechanisms in online social networks IEEE Trans. Inf. Forensics Secur. 2013 10.1109/TIFS.2013.2280884 8 1815 

  29. Lundeen, R., Ou, J., and Rhodes, T. (2018, November 01). New Ways Im Going to Hack Your Web APP. Available online: https://www.blackhat.com/html/bh-ad-11/bh-ad-11-archives.htmlLundeen. 

  30. 10.1109/CASoN.2010.139 Ding, X., Zhang, L., Wan, Z., and Gu, M. (2010, January 26-28). A brief survey on de-anonymization attacks in online social networks. Proceedings of the IEEE International Conference on Computational Aspects of Social Networks (CASoN 2010), Taiyuan, China. 

  31. 10.1145/2994620.2994632 Gulyás, G.G., Simon, B., and Imre, S. (2016, January 24). An Efficient and Robust Social Network De-anonymization Attack. Proceedings of the Workshop on Privacy in the Electronic Society, Vienna, Austria. 

  32. Wani, M.A., Jabin, S., and Ahmad, N. (2018, October 29). A sneak into the Devil’s Colony-Fake Profiles in Online Social Networks. Available online: https://arxiv.org/ftp/arxiv/papers/1705/1705.09929.pdf. 

  33. Perlroth, N. (2018, November 01). Fake Twitter Followers Become Multimillion-Dollar Business. Available online: https://bits.blogs.nytimes.com/2013/04/05/fake-twitter-followers-becomes-multimillion-dollar-business/?_php=true&_type=blogs&ref=technology&_r=0. 

  34. 10.5121/ijnsa.2014.6107 Kharaji, M.Y., Rizi, F.S., and Khayyambashi, M.R. (arXiv, 2014). A New Approach for Finding Cloned Profiles in Online Social Networks, arXiv. 

  35. Lewis, J. (The Telegraph, 2012). How spies used Facebook to Steal NATO Chief’s Details, The Telegraph. 

  36. Heatherly Preventing private information inference attacks on social networks IEEE Trans. Knowl. Data Eng. 2013 10.1109/TKDE.2012.120 25 1849 

  37. Viswanath, B., Bashir, M.A., Crovella, M., Guha, S., Gummadi, K.P., Krishnamurthy, B., and Mislove, A. (2014, January 20-22). Towards Detecting Anomalous User Behavior in Online Social Networks. Proceedings of the USENIX Security Symposium, San Diego, CA, USA. 

  38. Torabi, S., and Beznosov, K. (2013, January 12). Privacy Aspects of Health Related Information Sharing in Online Social Networks. Proceedings of the 2013 USENIX Conference on Safety, Security, Privacy and Interoperability of Health Information Technologies, Washington, DC, USA. 

  39. Scism, L., and Maremont, M. (The Wall Street Journal, 2010). Insurers Test Data Profiles to Identify Risky Clients, The Wall Street Journal. 

  40. Humphreys Mobile social networks and social practice: A case study of Dodgeball J. Comput.-Mediat. Commun. 2007 10.1111/j.1083-6101.2007.00399.x 13 341 

  41. Doyle A study on cyberstalking: Understanding investigative hurdles FBI Law Enforc. Bull. 2003 72 10 

  42. Walker Exploring Cyber Harassment among Women Who Use Social Media Univers. J. Public Health 2015 10.13189/ujph.2015.030504 3 194 

  43. Ali User Profiling: A Privacy Issue in Online Public Network Sindh Univ. Res. J. (Sci. Seri.) 2017 49 125 

  44. Fuchs Towards a theoretical model of social media surveillance in contemporary society Commun. Eur. J. Commun. Res. 2015 40 113 

  45. 10.1145/1102199.1102214 Gross, R., and Acquisti, A. (2005, January 7-10). Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the Electronic Society, Alexandria, VA, USA. 

  46. Zhang, W., and Al Amin, H. (2015, January 9-11). Privacy and security concern of online social networks from user perspective. Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP2015), ESEO, Angers, Loire Valley, France. 

  47. Carminati Semantic web-based social network access control Comput. Secur. 2011 10.1016/j.cose.2010.08.003 30 108 

  48. 10.1145/1280680.1280706 Strater, K., and Richter, H. (2007, January 18-20). Examining privacy and disclosure in a social networking community. Proceedings of the 3rd Symposium on Usable Privacy and Security, Pittsburgh, PA, USA. 

  49. Miltgen Cultural and generational influences on privacy concerns: A qualitative study in seven European countries Eur. J. Inf. Syst. 2014 10.1057/ejis.2013.17 23 103 

  50. Fletcher, D. (2018, November 10). How Facebook Is Redefining Privacy. Available online: http://content.time.com/time/magazine/article/0,9171,1990798,00.html. 

  51. 10.1109/PerComW.2012.6197507 Madejski, M., Johnson, M., and Bellovin, S.M. (2012, January 19-23). A study of privacy settings errors in an online social network. Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, Lugano, Switzerland. 

  52. Penni The future of online social networks (OSN): A measurement analysis using social media tools and application Telemat. Inform. 2017 10.1016/j.tele.2016.10.009 34 498 

  53. Boshmaf Design and analysis of a social botnet Comput. Netw. 2013 10.1016/j.comnet.2012.06.006 57 556 

  54. Makridakis Understanding the behavior of malicious applications in social networks IEEE Netw. 2010 10.1109/MNET.2010.5578913 24 14 

  55. Tam The evolution of android malware and android analysis techniques ACM Comput. Surv. 2017 10.1145/3017427 49 76 

  56. Provos, N., McNamee, D., Mavrommatis, P., Wang, K., and Modadugu, N. (2007, January 10). The Ghost in the Browser: Analysis of Web-based Malware. Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots’07), Cambridge, MA, USA. 

  57. 10.1007/978-3-319-04918-2_23 Chaabane, A., Ding, Y., Dey, R., Kaafar, M.A., and Ross, K.W. (2014, January 10-11). A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information?. Proceedings of the 15th International Conference on Passive and Active Network Measurement, Los Angeles, CA, USA. 

관련 콘텐츠

오픈액세스(OA) 유형

GOLD

오픈액세스 학술지에 출판된 논문

저작권 관리 안내
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로