An Automata-Based Approach to Evolving Privacy Policies for Social Networks

Author(s):  
Raúl Pardo ◽  
Christian Colombo ◽  
Gordon J. Pace ◽  
Gerardo Schneider
2014 ◽  
Vol 75 ◽  
pp. 531-543 ◽  
Author(s):  
Constantinos Patsakis ◽  
Athanasios Zigomitros ◽  
Achilleas Papageorgiou ◽  
Edgar Galván-López

2019 ◽  
Vol 12 (29) ◽  
pp. 1-7
Author(s):  
Pranay Garg ◽  
Chethana R Murthy ◽  
◽  

2013 ◽  
Vol 02 (04) ◽  
pp. 157-164 ◽  
Author(s):  
Sergio Donizetti Zorzo ◽  
Rodrigo Pereira Botelho ◽  
Paulo Muniz de Ávila

E-methodology ◽  
2019 ◽  
Vol 5 (5) ◽  
pp. 100-112
Author(s):  
Paolo Di Sia

Aim. In recent years, social networks have multiplied on the Internet, becoming more and more used, and consequently raising doubts about the security of privacy. This exponential development has attracted the attention of bad-intentioneds too. The aim of the research is to undestand how “attack algorithms” can violate the privacy of millions of people, despite privacy policies which do not allow their use.  Methods. Considering an analysis on password security on Facebook, I evaluate the problems connected with the use of an attack algorithm in relation to privacy and security.  Results. Over the  years, Facebook privacy policies have been changed, but with new services it is still possible to trace personal information. Using special phishing techniques it is possible to get the access credentials of a good percentage of users. This allows attackers to perform online transactions, view bank accounts and their transactions, call details, credit card numbers and many other personal data.  Conclusions. Waiting for the power of the future quantum Internet, it is unfortunately possible today to launch an attack exploiting the analysed techniques and even improve them, making them more effective and reaching even higher success rates, thus placing a very high number of users in serious danger.


Sign in / Sign up

Export Citation Format

Share Document