An Analysis On Security Awareness Of Social Networks Users

eBook Download

BOOK EXCERPT:

Product Details :

Genre : Computer security
Author : Mahdi Darvishi
Publisher :
Release : 2013
File : 0 Pages
ISBN-13 : OCLC:960266969


Social Networks Science Design Implementation Security And Challenges

eBook Download

BOOK EXCERPT:

The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users’ information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients’ medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts’ panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.

Product Details :

Genre : Computers
Author : Nilanjan Dey
Publisher : Springer
Release : 2018-06-18
File : 177 Pages
ISBN-13 : 9783319900599


Security And Privacy In Social Networks

eBook Download

BOOK EXCERPT:

Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first comprehensive attempt dedicated entirely to this field. In order to facilitate the transition of such methods from theory to mechanisms designed and deployed in existing online social networking services, the book aspires to create a common language between the researchers and practitioners of this new area- spanning from the theory of computational social sciences to conventional security and network engineering.

Product Details :

Genre : Computers
Author : Yaniv Altshuler
Publisher : Springer Science & Business Media
Release : 2012-08-14
File : 254 Pages
ISBN-13 : 9781461441397


Privacy Risk Analysis Of Online Social Networks

eBook Download

BOOK EXCERPT:

The social benefit derived from Online Social Networks (OSNs) can lure users to reveal unprecedented volumes of personal data to an online audience that is much less trustworthy than their offline social circle. Even if a user hides his personal data from some users and shares with others, privacy settings of OSNs may be bypassed, thus leading to various privacy harms such as identity theft, stalking, or discrimination. Therefore, users need to be assisted in understanding the privacy risks of their OSN profiles as well as managing their privacy settings so as to keep such risks in check, while still deriving the benefits of social network participation. This book presents to its readers how privacy risk analysis concepts such as privacy harms and risk sources can be used to develop mechanisms for privacy scoring of user profiles and for supporting users in privacy settings management in the context of OSNs. Privacy scoring helps detect and minimize the risks due to the dissemination and use of personal data. The book also discusses many open problems in this area to encourage further research.

Product Details :

Genre : Computers
Author : Sourya Joyee De
Publisher : Springer Nature
Release : 2022-06-01
File : 95 Pages
ISBN-13 : 9783031023552


Online Social Networks Security

eBook Download

BOOK EXCERPT:

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.

Product Details :

Genre : Computers
Author : Brij B. Gupta
Publisher : CRC Press
Release : 2021-02-25
File : 121 Pages
ISBN-13 : 9781000347111


Security And Trust In Online Social Networks

eBook Download

BOOK EXCERPT:

The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to their commercial use, strict interconnection among users and resources characterizing them, as well as user attitude to easily share private data and activities with strangers. In this book, we discuss three main research topics connected to security in online social networks: (i) trust management, because trust can be intended as a measure of the perception of security (in terms of risks/benefits) that users in an OSN have with respect to other (unknown/little-known) parties; (ii) controlled information sharing, because in OSNs, where personal information is not only connected to user profiles, but spans across users' social activities and interactions, users must be provided with the possibility to directly control information flows; and (iii) identity management, because OSNs are subjected more and more to malicious attacks that, with respect to traditional ones, have the advantage of being more effective by leveraging the social network as a new medium for reaching victims. For each of these research topics, in this book we provide both theoretical concepts as well as an overview of the main solutions that commercial/non-commercial actors have proposed over the years. We also discuss some of the most promising research directions in these fields.

Product Details :

Genre : Computers
Author : Barbara Carminati
Publisher : Springer Nature
Release : 2022-05-31
File : 110 Pages
ISBN-13 : 9783031023392


A Comparison Of Users Personal Information Sharing Awareness Habits And Practices In Social Networking Sites And E Learning Systems

eBook Download

BOOK EXCERPT:

Although reports of identity theft continue to be widely published, users continue to post an increasing amount of personal information online, especially within social networking sites (SNS) and e-learning systems (ELS). Research has suggested that many users lack awareness of the threats that risky online personal information sharing poses to their personal information. However, even among users who claim to be aware of security threats to their personal information, actual awareness of these security threats is often found to be lacking. Although attempts to raise users' awareness about the risks of sharing their personal information have become more common, it is unclear if users are unaware of the risks, or are simply unwilling or unable to protect themselves. Research has also shown that users' habits may also have an influence on their practices. However, user behavior is complex, and the relationship between habit and practices is not clear. Habit theory has been validated across many disciplines, including psychology, genetics, and economics, with very limited attention in IS. Thus, the main goal of this study was to assess the influence of users' personal information sharing awareness (PISA) on their personal information sharing habits (PISH) and personal information sharing practices (PISP), as well as to compare the three constructs between SNS and ELS. Although habit has been studied significantly in other disciplines, a limited number of research studies have been conducted regarding IS usage and habit. Therefore, this study also investigated the influence of users' PISH on their PISP within the contexts of SNS and ELS. An empirical survey instrument was developed based on prior literature to collect and analyze data relevant to these three constructs. Path analysis was conducted on the data to determine the influence of users' PISA on their PISH and PISP, as well as the influence of users' PISH on their PISP. This study also utilized ANCOVA to determine if, and to what extent, any differences may exist between users' PISA, PISH, and PISP within SNS and ELS. The survey was deployed to the student body and faculty members at a small private university in the Southeast United States; a total of 390 responses was received. Prior to final data analysis, pre-analysis data screening was performed to ensure the validity and accuracy of the collected data. Cronbach's Alpha was performed on PISA, PISH, and PISP, with all three constructs demonstrating high reliability. PISH was found to be the most significant factor evaluated in this study, as users' habits were determined to have the strongest influence on their PISP within the contexts of SNS and ELS. The main contribution of this study was to advance the understanding of users' awareness of information security threats, their personal information sharing habits, and their personal information sharing practices. Information gained from this study may help organizations in the development of better approaches to the securing of users' personal information.

Product Details :

Genre :
Author : Albert L. Ball
Publisher :
Release : 2012
File : 250 Pages
ISBN-13 : OCLC:926973740


Proceedings Of The International Conference On Cybersecurity Situational Awareness And Social Media

eBook Download

BOOK EXCERPT:

This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters “Municipal Cybersecurity—A Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Product Details :

Genre : Science
Author : Cyril Onwubiko
Publisher : Springer Nature
Release : 2023-03-07
File : 476 Pages
ISBN-13 : 9789811964145


End User Security Privacy Behaviour On Social Media

eBook Download

BOOK EXCERPT:

Security and privacy practices of end-users on social media are an important area of research, as well as a top-of-mind concern for individuals as well as organizations. In recent years, we have seen a sharp increase in data breaches and cyber security threats that have targeted social media users. Hence, it is imperative that we try to better understand factors that affect an end-user's adoption of effective security safeguards and privacy protection practices. In this research, we propose and validate a theoretical model that posits several determinants of end-user security and privacy practices on social media. We hypothesize relationships among various cognitive, affective and behavioral factors identified under the themes of posture, proficiency, and practices. These constructs and hypotheses are validated through empirical research comprising an online survey questionnaire, and structural equation modeling (SEM) analysis. The key findings of this study highlight the importance of cyber threat awareness and social media security and privacy self-efficacy, which have a direct impact on end-user security and privacy practices. Additionally, our research shows that use of general technology applications for security and privacy impacts the adoption of security and privacy practices on social media. In totality, our research findings indicate that proficiency is a better predictor or security and privacy practices as compared to the posture of an end-user. Factors such as privacy disposition, privacy concerns, and perceived risk of privacy violations do not have as significant or direct effect on security and privacy practices. Based on our research findings, we provide some key take-aways in the form of theoretical contributions, suggestions for future research, as well as recommendations for organizational security awareness training programs.

Product Details :

Genre :
Author : Amir Akbari Koochaksaraee
Publisher :
Release : 2019
File : Pages
ISBN-13 : OCLC:1119066553


Iccws 2018 13th International Conference On Cyber Warfare And Security

eBook Download

BOOK EXCERPT:

These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8-9 March 2018.

Product Details :

Genre :
Author : Dr. Louise Leenen
Publisher : Academic Conferences and publishing limited
Release : 2018-03-08
File : 707 Pages
ISBN-13 : 9781911218739