scholarly journals Preventing malicious accounts based on mining with steganography in online

2018 ◽  
Vol 7 (3.3) ◽  
pp. 615
Author(s):  
Ms K. Karpaga Priyaa ◽  
Keerthipati Lahari ◽  
V Vasundhara ◽  
C Saranya

On-line Social Networks (OSNs) are progressively exerting consequences on the way communication takes place among people through sites such as Twitter, Facebook, Google+ and LinkedIn, possessing millions of users. The Online Social Networks’ (OSN) users face security-privacy threats such as Profile cloning, privacy breach and malware attacks. By these attacks, the fake user steals the virtual identity of the original user which they use to interact with other online users. To prevent these attacks, the proposed system uses Steganography which is the process of hiding information within other non-secret text or data. Our proposed system utilizes Steganography by implementing Watermarking technique which hides a secret text inside an image invisibly. Moreover the system avoids the leakage of personal information and prevents the creation of fake accounts. Experimental results show that the proposed technique can effectively detect and prevent creating malicious accounts in comparison with the techniques reported previously.  

2010 ◽  
Vol 25 (2) ◽  
pp. 109-125 ◽  
Author(s):  
Hanna Krasnova ◽  
Sarah Spiekermann ◽  
Ksenia Koroleva ◽  
Thomas Hildebrand

On online social networks such as Facebook, massive self-disclosure by users has attracted the attention of Industry players and policymakers worldwide. Despite the Impressive scope of this phenomenon, very little Is understood about what motivates users to disclose personal Information. Integrating focus group results Into a theoretical privacy calculus framework, we develop and empirically test a Structural Equation Model of self-disclosure with 259 subjects. We find that users are primarily motivated to disclose Information because of the convenience of maintaining and developing relationships and platform enjoyment. Countervailing these benefits, privacy risks represent a critical barrier to information disclosure. However, users’ perception of risk can be mitigated by their trust in the network provider and availability of control options. Based on these findings, we offer recommendations for network providers.


Author(s):  
Rodrigo Igawa ◽  
Alex Almeida ◽  
Bruno Zarpelão ◽  
Sylvio Jr

In this work, we propose an approach for recognition of compromised Twitter accounts based on Authorship Verification. Our solution can detect accounts that became compromised by analysing their user writing styles. This way, when an account content does not match its user writing style, we affirm that the account has been compromised, similar to Authorship Verification. Our approach follows the profile-based paradigm and uses N-grams as its kernel. Then, a threshold is found to represent the boundary of an account writing style. Experiments were performed using a subsampled dataset from Twitter. Experimental results showed that the developed model is very suitable for compromised recognition of Online Social Networks accounts due to the capability of recognize user styles over 95% accuracy.


Author(s):  
Mª del Rosario Rodríguez Díaz ◽  
Mª José González Río ◽  
Mª Ángeles Rebollo Catalán

ABSTRACTThis paper presents the main results of an investigation whose purpose is to investigate the adoption of on-line social networks in SMEs run by women. The base assumption is that the use of networks as a strategic communication element is still at an early stage of development, far from being an established practice. Our interest in this study is to determine the willingness and motivations of entrepreneurs in using these networks, as well as utilities and difficulties they have faced. Our goal is to visualize the change of attitude and competences that entrepreneurs are imprinting on their businesses within the competitive environment they operate in. Ultimately, we are interested in studying the perception of women-entrepreneurs regarding the adoption of online social networks to the extent where they are, as an additional management tool. We find ourselves facing a new field of knowledge on which there are very few references and very little research has been carried. Hence, this study has a primarily qualitative and exploratory purpose. To obtain the needed information we held semi-structured interviews to fourteen Andalusian entrepreneurs, coming from different business fields. The main findings were that just less than a half of them used them, or implemented them in their companies, as communication tools. The others, depending on to the size of their business, adopted them as an extension of the personal use in which they had been started.RESUMENEste trabajo presenta los principales resultados de una investigación cuya finalidad es conocer la adopción de las redes sociales on-line en las pymes dirigidas por mujeres. Se parte de la base de que el uso de redes, como elemento estratégico de comunicación, se encuentra todavía en una fase incipiente de desarrollo, lejos aún de ser una práctica consolidada. Nuestro interés en este trabajo es conocer la predisposición y motivaciones de las empresarias hacia el uso estas redes, así como las utilidades y dificultades a las que han de enfrentarse. Nos interesa visibilizar el cambio actitudinal y competencial que las empresarias están imprimiendo en sus empresas dentro del marco competitivo en el que se encuentran. En definitiva, nos interesa estudiar la percepción que tienen las empresarias sobre el uso de las redes sociales online en la medida en que están insertas, como una herramienta más de gestión empresarial. Nos situamos ante un nuevo ámbito de conocimiento sobre el que apenas existen referencias bibliográficas ni se ha realizado apenas investigación; de ahí que la investigación tenga una finalidad fundamentalmente exploratoria y de carácter cualitativo. Para la obtención de la información se realizaron catorce entrevistas semi-estructuradas entre empresarias andaluzas de distintos sectores de actividad. Entre los principales resultados encontramos que algo menos de la mitad de ellas las utilizan, o están implantadas en sus empresas, como herramientas de comunicación. El resto, y relacionado con el tamaño de sus negocios, las utilizan como una prolongación del uso personal en el que se iniciaron.


Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


Author(s):  
Georgios Michaelides ◽  
Gábor Hosszú

The importance of the virtual communities’ privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comfortable publishing their personal information and narrating their lives. They are often unaware how vulnerable the data in their public profiles are, which a large audience daily accesses. A so-called digital friendship is built among them. Such commercial and social pressures have led to a number of privacy and security risks for social network members. The article presents the most important vulnerabilities and suggests protection methods and solutions that can be utilized according to the threat. Lastly, the authors introduce the concept of a privacy-friendly virtual community site, named CWIW, where privacy methods have been implemented for better user protection.


Author(s):  
Ramanpreet Kaur ◽  
Tomaž Klobučar ◽  
Dušan Gabrijelčič

This chapter is concerned with the identification of the privacy threats to provide a feedback to the users so that they can make an informed decision based on their desired level of privacy. To achieve this goal, Solove's taxonomy of privacy violations is refined to incorporate the modern challenges to the privacy posed by the evolution of social networks. This work emphasizes on the fact that the privacy protection should be a joint effort of social network owners and users, and provides a classification of mitigation strategies according to the party responsible for taking these countermeasures. In addition, it highlights the key research issues to guide the research in the field of privacy preservation. This chapter can serve as a first step to comprehend the privacy requirements of online users and educate the users about their choices and actions in social media.


Author(s):  
Maryam Qamar ◽  
Mehwish Malik ◽  
Saadia Batool ◽  
Sidra Mehmood ◽  
Asad W. Malik ◽  
...  

This work covers the research work on decentralization of Online Social Networks (OSNs), issues with centralized design are studied with possible decentralized solutions. Centralized architecture is prone to privacy breach, p2p architecture for data and thus authority decentralization with encryption seems a possible solution. OSNs' users grow exponentially causing scalability issue, a natural solution is decentralization where users bring resources with them via personal machines or paid services. Also centralized services are not available unremittingly, to this end decentralization proposes replication. Decentralized solutions are also proposed for reliability issues arising in centralized systems and the potential threat of a central authority. Yet key to all problems isn't found, metadata may be enough for inferences about data and network traffic flow can lead to information on users' relationships. First issue can be mitigated by data padding or splitting in uniform blocks. Caching, dummy traffic or routing through a mix of nodes can be some possible solutions to the second.


2018 ◽  
Vol 7 (1.7) ◽  
pp. 142
Author(s):  
Hemalatha D ◽  
Almas Begum ◽  
Alex David S

Presently, the growth of Social media is explosive among the users. Increasingly developed social websites like Flickr, Facebook, Google+, LinkedIn etc permits the users to create, share and view the post. Confidentiality is a leading factor required in Social Networks. The social users upload their photos to the social sites that intend to gain public interest for social purposes. The exposure of personal information leads to slipping process like identity stealing, morphing etc, which are against the privacy violations. Relied upon the personal characteristics of users, the privacy settings of each user should be defined. In this paper, a relational study about the privacy settings in Online Social structure is examined. Initiated by the importance of social networks among the social users and their behavior towards Online Social Networks, which is followed by the privacy techniques suggested by other researchers are explored. At last, an overview about the merits and demerits of privacy designs and schemes for the user-uploaded images are presented. The study results a new privacy system that controls the confidential information from being accessed from different devices, including mobile devices and computers.


Sign in / Sign up

Export Citation Format

Share Document