Creating Safe and Trusted Social Networks with Biometric User Authentication

Author(s):  
Ho B. Chang ◽  
Klaus G. Schroeter
2018 ◽  
Vol 2 (3-2) ◽  
pp. 220
Author(s):  
Dalian Wu Zhia Sheng ◽  
Isredza Rahmi A Hamid ◽  
Hannani Aman

Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.


2020 ◽  
Vol 8 (3) ◽  
pp. 833-844 ◽  
Author(s):  
Jian Shen ◽  
Anxi Wang ◽  
Chen Wang ◽  
Jiguo Li ◽  
Yan Zhang

Author(s):  
Dalian Wu Zhia Sheng ◽  
Isredza Rahmi A Hamid ◽  
Hannani Aman

Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.


Author(s):  
Mark E. Dickison ◽  
Matteo Magnani ◽  
Luca Rossi

2006 ◽  
Vol 27 (2) ◽  
pp. 108-115 ◽  
Author(s):  
Ana-Maria Vranceanu ◽  
Linda C. Gallo ◽  
Laura M. Bogart

The present study investigated whether a social information processing bias contributes to the inverse association between trait hostility and perceived social support. A sample of 104 undergraduates (50 men) completed a measure of hostility and rated videotaped interactions in which a speaker disclosed a problem while a listener reacted ambiguously. Results showed that hostile persons rated listeners as less friendly and socially supportive across six conversations, although the nature of the hostility effect varied by sex, target rated, and manner in which support was assessed. Hostility and target interactively impacted ratings of support and affiliation only for men. At least in part, a social information processing bias could contribute to hostile persons' perceptions of their social networks.


Sign in / Sign up

Export Citation Format

Share Document