scholarly journals Prevention of Clone Attack in Online Social Media Integrating Secure Data Transmission

Author(s):  
Abishek Kashyap. S

Social networking is becoming so essential nowadays and is playing a bigger role in every man’s life for sharing information and knowledge. Also social network is used to see the everyday activities, photos, videos, political agendas and propagandas. Therefore, it is now becoming an important tool to stay updated in this dynamic world. With large chunks of data being generated every second, there is a growing concern about Data protection and user privacy in the Social media network. One of the major concerns being, ‘Fake Users’ - misusing the authorized user’s information like photos and videos without the authorized user’s permission and disguising oneself as a legitimate user. In our contemporary world, many fake profiles are being created for fraudulent activities like money making, malware / virus / Trojan distribution to use user data, especially with malicious intent. In this paper Java static watermarking is proposed. Java static watermark is used in our social media website in order to associate each user's footprint with respect to their unique ID, eliminating the crux of fake users. It is also very evident to say that data present on the cloud is no less prone to cyber-attacks. In this paper, integration of steganography methods for protection of sensitive data on the public cloud server is also proposed to validate its viability and its increased security. The Algorithms used ensure the individual information is kept secret and transmitted in a secure manner with user privacy preserving.

Author(s):  
Linh Nguyen ◽  
Kim Barbour

This paper explores whether or not our online social media persona is viewed as authentic. The selfie is a fundamental part of the structure of the online identity for young people in today’s digital world. The relationship between an individual’s self-identity in the physical face-to-face environment was analysed and compared to a carefully constructed, modified virtual representation in a selfie posted on social media platforms. Data was obtained through four focus groups at the University of Adelaide. Two key theoretical frameworks provide a basis for this study: Erving Goffman’s concept of the self as a performance, and Charles Horton Cooley’s concept of the looking glass self. In examining the focus group discussions in light of these two frameworks as well as associated literature, we conclude that the authenticity of the selfie as a way of visualising a social media persona is subjective and dependent on the individual posting a selfie. Ultimately, authenticity involves a degree of subjectivity. It was on this basis that focus group participants argued that selfies could be considered authentic expressions of identity.


Purpose – This paper aims to evaluate the use of online social media as a way to engage and motivate students in language learning. Design/methodology/approach – Presents a case study in which students of English for Specific Purposes first use Moodle, a learning management system, as the basis for course instruction and then supplement this with the use of Facebook for course discussions and access to supplementary materials. Findings – For today’s university students, social media online are an integral part of their everyday experience. Twitter, Facebook and so on let them share interests and enthusiasms with a network of friends. They use web-based tools – email, blogs and chatrooms – every day to discuss what they are doing with like-minded people. All the more surprising then that online social media are not widely used in language teaching. After all, to learn a language successfully, the individual has to use it to interact with other people. So why not use these social networks to involve and motivate language learners? Research limitations/implications – An exploratory study that indicates opportunities for further research into the extent to which online social media can facilitate the development of students’ language skills. Practical implications – Demonstrates the value of using a familiar social networking site in language learning to supplement more structured learning. Shows that when used in this way, Facebook can encourage active student participation and increase the sense of community among course participants. Social implications – Draws attention to the increase in engagement among language students when they can choose when and how to interact outside of the constraints of the formal learning environment. Originality/value – Suggests reasons why online social media should be more widely used in language teaching in higher education. Offers evidence for the benefits of combining this with a more formal learning platform.


Symmetry ◽  
2021 ◽  
Vol 14 (1) ◽  
pp. 30
Author(s):  
Qinglang Guo ◽  
Haiyong Xie ◽  
Yangyang Li ◽  
Wen Ma ◽  
Chao Zhang

The online social media ecosystem is becoming more and more confused because of more and more fake information and the social media of malicious users’ fake content; at the same time, unspeakable pain has been brought to mankind. Social robot detection uses supervised classification based on artificial feature extraction. However, user privacy is also involved in using these methods, and the hidden feature information is also ignored, such as semi-supervised algorithms with low utilization rates and graph features. In this work, we symmetrically combine BERT and GCN (Graph Convolutional Network, GCN) and propose a novel model that combines large scale pretraining and transductive learning for social robot detection, BGSRD. BGSRD constructs a heterogeneous graph over the dataset and represents Twitter as nodes using BERT representations. Corpus learning via text graph convolution network is a single text graph, which is mainly built for corpus-based on word co-occurrence and document word relationship. BERT and GCN modules can be jointly trained in BGSRD to achieve the best of merit, training data and unlabeled test data can spread label influence through graph convolution and can be carried out in the large-scale pre-training of massive raw data and the transduction learning of joint learning representation. The experiment shows that a better performance can also be achieved by BGSRD on a wide range of social robot detection datasets.


2016 ◽  
Vol 2016 ◽  
pp. 1-15 ◽  
Author(s):  
Sanaa Ghouzali ◽  
Maryam Lafkih ◽  
Wadood Abdul ◽  
Mounia Mikram ◽  
Mohammed El Haziti ◽  
...  

With the exponential increase in the dependence on mobile devices in everyday life, there is a growing concern related to privacy and security issues in the Gulf countries; therefore, it is imperative that security threats should be analyzed in detail. Mobile devices store enormous amounts of personal and financial information, unfortunately without any security. In order to secure mobile devices against different threats, biometrics has been applied and shown to be effective. However, biometric mobile applications are also vulnerable to several types of attacks that can decrease their security. Biometric information itself is considered sensitive data; for example, fingerprints can leave traces in touched objects and facial images can be captured everywhere or accessed by the attacker if the facial image is stored in the mobile device (lost or stolen). Hence, an attacker can easily forge the identity of a legitimate user and access data on a device. In this paper, the effects of a trace attack on the sensitivity of biometric mobile applications are investigated in terms of security and user privacy. Experimental results carried out on facial and fingerprint mobile authentication applications using different databases have shown that these mobile applications are vulnerable to the proposed attack, which poses a serious threat to the overall system security and user privacy.


2012 ◽  
Vol 3 (5) ◽  
pp. 379-381
Author(s):  
Dr. Aruna Kumar Mishra ◽  
◽  
Narendra Kumar Narendra Kumar ◽  
Abhishek Sharma

2020 ◽  
Vol 24 (1) ◽  
pp. 58
Author(s):  
Anwar Hafidzi

This research begins with an understanding of the endemic radicalism of society, not only of the real world, but also of various online social media. This study showed that the avoidance of online radicalism can be stopped as soon as possible by accusing those influenced by the radical radicality of a secular religious approach. The methods used must be assisted in order to achieve balanced understanding (wasathiyah) under the different environmental conditions of the culture through recognizing the meaning of religion. The research tool used is primarily library work and the journal writings by Abu Rokhmad, a terrorist and radicalise specialist. The results of this study are that an approach that supports inclusive ism will avoid the awareness of radicalization through a heart-to-heart approach. This study also shows that radical actors will never cease to argue dramatically until they are able to grasp different views from Islamic law, culture, and families.Keywords: radicalism, deradicalization, multiculturalism, culture, religion, moderate.Penelitian ini berawal dari paham radikalisme yang telah mewabah di masyarakat, bukan hanya di dunia nyata, bahkan sudah menyusup di berbagai media sosial online. Penelitian ini menemukan bahwa cara menangkal radikalisme online dapat dilakukan pencegahan sedini mungkin melalui pendekatan konseling religius multikultural terhadap mereka yang terkena paham radikal radikal. Diantara teknik yang digunakan adalah melalui pemahaman tentang konsep agama juga perlu digalakkan agar memunculkan pemahaman yang moderat (wasathiyah) diberbagai keadaan lingkungan masyarakat. Metode yang digunakan untuk penelitian ini adalah library research dengan sumber utama adalah karya dan jurnal karya Abu Rokhmad seorang pakar dalam masalah terorisme dan radikalisme. Temuan penelitian ini adalah paham radikalisasi itu dapat dihentikan dengan pendekatan hati ke hati dengan mengedepankan budaya yang multikultural. Kajian ini juga membuktikan bahwa pelaku paham radikal tidak akan pernah berhenti memberikan argumen radikal kecuali mampu memahami perbedaan pendapat yang bersumber dari syariat Islam, lingkungan sosial, dan keluarga.Kata kunci: radikalisme, deradikalisasi, multikultural, budaya, agama, moderat.


2012 ◽  
Author(s):  
Fouad H. Mirzaei ◽  
Fredrik Odegaard ◽  
Xinghao Yan

Sign in / Sign up

Export Citation Format

Share Document