scholarly journals Vulnerability to social engineering in social networks: a proposed user-centric framework

Author(s):  
Samar Albladi ◽  
George R. S. Weir
Author(s):  
José Poças Rascão ◽  
Nuno Gonçalo Poças

The article is about human rights freedom of expression, the right to privacy, and ethics. Technological development (internet and social networks) emphasizes the issue of dialectics and poses many challenges. It makes the theoretical review, the history of human rights through and reference documents, an analysis of the concepts of freedom, privacy, and ethics. The internet and social networks pose many problems: digital data, people's tracks, the surveillance of citizens, the social engineering of power, online social networks, e-commerce, spaces of trust, and conflict.


Author(s):  
Oleksandr Trukhachov

The article focuses on elements of social engineering (SI) that could be used by the states in their own interests during the COVID-19 pandemic. These elements were used to form negative public opinion, change the political landscape, and reduce citizens’ trust in their own governments. These elements are influence and persuasion. Traditional media and social networks play a major role in the use of these SI elements. SI has a long history of theoretical study as a scientific phenomenon. Practical elements of SI have a large arsenal, from government tools to influencing individuals. The article aims to demonstrate using SI elements, influence, and persuasion by the interested states and governments to obtain certain preferences for both foreign and domestic policies.


2021 ◽  
Author(s):  
◽  
Koshy John

<p>Scientific researchers faced with extremely large computations or the requirement of storing vast quantities of data have come to rely on distributed computational models like grid and cloud computing. However, distributed computation is typically complex and expensive. The Social Cloud for Public eResearch aims to provide researchers with a platform to exploit social networks to reach out to users who would otherwise be unlikely to donate computational time for scientific and other research oriented projects. This thesis explores the motivations of users to contribute computational time and examines the various ways these motivations can be catered to through established social networks. We specifically look at integrating Facebook and BOINC, and discuss the architecture of the functional system and the novel social engineering algorithms that power it.</p>


2021 ◽  
Author(s):  
◽  
Koshy John

<p>Scientific researchers faced with extremely large computations or the requirement of storing vast quantities of data have come to rely on distributed computational models like grid and cloud computing. However, distributed computation is typically complex and expensive. The Social Cloud for Public eResearch aims to provide researchers with a platform to exploit social networks to reach out to users who would otherwise be unlikely to donate computational time for scientific and other research oriented projects. This thesis explores the motivations of users to contribute computational time and examines the various ways these motivations can be catered to through established social networks. We specifically look at integrating Facebook and BOINC, and discuss the architecture of the functional system and the novel social engineering algorithms that power it.</p>


2019 ◽  
Vol 2019 ◽  
pp. 1-14 ◽  
Author(s):  
Bo Feng ◽  
Qiang Li ◽  
Yuede Ji ◽  
Dong Guo ◽  
Xiangyu Meng

Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.


Author(s):  
José C. Delgado

Current social networks are centralized and driven by the providers’ formats, policies, and rules. Subscribing to several networks usually implies duplicating profile information and the effort of replicating changes when needed. Recently, there have been several proposals to support decentralized social networks, but these maintain the client-server paradigm. This chapter recognizes that the user is no longer a mere consumer, but rather a producer, and calls for a paradigm shift, with the user at the center of the social network scenarios, taking the role of an active service, in equal terms with social network providers. This leads to a unified user model: both individual and institutional entities are both users and providers and share the same protocols, although with different emphasis. We call this the user-centric approach and show a migration path from current social network models. To support this approach, we present a new Web access device, the browserver, which includes a browser and a server working in close cooperation, with the goal of replacing the classical browser but being backwards compatible with it to ease the migration path.


2014 ◽  
Vol 25 (3) ◽  
pp. 344-368 ◽  
Author(s):  
Edward M. Schortman ◽  
Patricia A. Urban

We contend that political structures emerge in the course of interpersonal dealings conducted by people organized within overlapping social networks. It is through these webs that resources needed to define and achieve goals and exert control over others are mobilized. Elites seeking to construct hierarchies and concentrate power must restructure the preexisting matrix of networks to redirect the flow of assets to their benefit. In doing so, they seek to create an affiliation that transcends loyalties to extant social groups while securing for themselves positions of preeminence within the overarching affiliation. Such social engineering involves manipulating the material symbols by which interpersonal ties are made tangible and imbued with emotional significance. The resulting political structures are less nested sets of stable territorial groups than dynamic networks of networks through which assets are deployed in the practices by which power is exercised. This perspective is used to describe Late Postclassic (A.D. 1300-1532) political processes in the Naco Valley, northwestern Honduras, calling attention to how power of various sorts took shape through complex relations among diverse people and varied things orchestrated within overlapping social networks. The implications of a network approach for studying political processes generally are also considered.


Sign in / Sign up

Export Citation Format

Share Document