scholarly journals Privacy preservation in mobile social networks

2019 ◽  
Author(s):  
◽  
Douglas Steiert

In this day and age with the prevalence of smartphones, networking has evolved in an intricate and complex way. With the help of a technology-driven society, the term "social networking" was created and came to mean using media platforms such as Myspace, Facebook, and Twitter to connect and interact with friends, family, or even complete strangers. Websites are created and put online each day, with many of them possessing hidden threats that the average person does not think about. A key feature that was created for vast amount of utility was the use of location-based services, where many websites inform their users that the website will be using the users' locations to enhance the functionality. However, still far too many websites do not inform their users that they may be tracked, or to what degree. In a similar juxtaposed scenario, the evolution of these social networks has allowed countless people to share photos with others online. While this seems harmless at face-value, there may be times in which people share photos of friends or other non-consenting individuals who do not want that picture viewable to anyone at the photo owner's control. There exists a lack of privacy controls for users to precisely de fine how they wish websites to use their location information, and for how others may share images of them online. This dissertation introduces two models that help mitigate these privacy concerns for social network users. MoveWithMe is an Android and iOS application which creates decoys that move locations along with the user in a consistent and semantically secure way. REMIND is the second model that performs rich probability calculations to determine which friends in a social network may pose a risk for privacy breaches when sharing images. Both models have undergone extensive testing to demonstrate their effectiveness and efficiency.

10.29007/st23 ◽  
2018 ◽  
Author(s):  
Jaweher Zouari ◽  
Mohamed Hamdi ◽  
Tai-Hoon Kim

Interacting with geographically proximate users who present similar interests and preferences is a key service offered by mobile social networks which leads to the creation of new connections that combine physical and social closeness. Usually these interactions are based on social profile matching where users publish their preferences and attributes to enable the search for a similar profile. Such public search would result in the leakage of sensitive or identifiable information to strangers who are not always potential friends. As a consequence this promising feature of mobile social networking may cause serious privacy breaches if not addressed properly. Most existent work relies on homomorphic encryption for privacy preservation during profile matching, while we propose in this paper a novel approach based on the fuzzy extractor which performs private matching of two sets and reveals them only if they overlap considerably. Our scheme achieves a desirable trade off between security and complexity.


2012 ◽  
Vol 61 (7) ◽  
pp. 3209-3222 ◽  
Author(s):  
Xiaohui Liang ◽  
Xu Li ◽  
Tom H. Luan ◽  
Rongxing Lu ◽  
Xiaodong Lin ◽  
...  

Author(s):  
Wadim Strielkowski

Being a combination of the conference call, talkback radio, audio podcast, and an online video chat, Clubhouse is a new social networking app that gained over 10 million users and over $100 in valuation in just 8 months. Unlike other social networks, it offers a real-time streaming audio chat that does not ask users to share any unnecessary information like exchanging text messages, conducting video calls, or sharing photos. Instead, Clubhouse users can listen to real-time conversations, contribute to these conversations and create their own conversations for the others to listen and to interact with. Often nicknamed a “Silicon Valley’s hottest start-up”, Clubhouse positions itself as an “exclusive” and “alternative” social network that attracts various celebrities and people who just want to talk to each other. Launched in March 2020, amidst the COVID-19 pandemic with its social distancing and lockdowns, Clubhouse offered its users a space for the digital group psychotherapy where people could solve their problems by talking them through with strangers. However, it is unclear what is going to happen to this new social network in the post-pandemic world after all of its hype eventually evaporates. This paper discusses the possible underlying motives for the Clubhouse creation and its real purposes. Moreover, it looks at the three possible scenarios of its further development.


Author(s):  
Vipin K. Nadda ◽  
Sumesh Singh Dadwal ◽  
Dirisa Mulindwa ◽  
Rubina Vieira

Revolutionary development in field of communication and information technology have globally opened new avenue of marketing tourism and hospitality products. Major shift in web usage happened when Napster in 1999 released peer-to-peer share media and then with pioneer social networking websites named ‘Six Degrees'. This kind of interactive social web was named as ‘Web 2.0'. It would create openness, community and interaction. Web2. is also known as Social media base. Social media is incudes “all the different kinds of content that form social networks: posts on blogs or forums, photos, audio, videos, links, profiles on social networking web sites, status updates and more”. It allows people to create; upload post and share content easily and share globally. Social media allows the creation and exchange of user-generated content and experiences online. Thus, social media is any kind of information we share with our social network, using social networking web sites and services.


2011 ◽  
pp. 1286-1297
Author(s):  
Malcolm Shore

This chapter is about the way in which computer hackers invoke social networking paradigms to support and encourage their activities. It reviews the evolution of hacking as a form of social networking, from its roots in Bulletin Board systems to the current attacks on Second Life, and considers the motivation for hacking. Ajzen’s Theory of Planned Behavior and Beveren’s Flow Theory model are, when considered together, found to explain many of the observed characteristics of early hacker activity. The place of social networks in motivating hacking is explored, and some observations are made in relation to hacking and the Second Life environment. A number of control variables are identified which can be used to reduce the likelihood of people engaging in the hacking activity. Addressing the social network factors which motivate hacking provides an important early step in addressing cybercrime.


Author(s):  
Justin Henley Beneke

Social networking is often touted as being a prominent application responsible for driving the adoption of residential broadband services. The growth of social networks is phenomenal – in many cases more than doubling in size on an annual basis. This study considers how social networking may be utilized for commercial purposes to spread word-of-mouth communication. The chapter therefore considers the characteristics of young adult social network users, how they behave and interact with other users on such platforms, as well as the manner in which marketers can make the most of this platform without experiencing a consumer backlash. The research suggests that if a symbiotic relationship does indeed exist between broadband proliferation and the adoption of social networking, both have a vested interest in each other’s continued success.


2013 ◽  
Vol 3 (2) ◽  
pp. 22-37
Author(s):  
N. Veerasamy ◽  
W. A. Labuschagne

The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.


2017 ◽  
Vol 13 (1) ◽  
pp. 66-81 ◽  
Author(s):  
Nastaran Hajiheydari ◽  
Babak Hazaveh Hesar Maskan ◽  
Mahdi Ashkani

Increasing world-wide trends of using mobile social networks and the rise of competition between different social applications makes it essential for social network providers and marketers to identify the key factors leading to user loyalty. The purpose of this paper is to identify the key factors that affect the loyalty of mobile social networks users. The proposed model was tested through structural equation modeling techniques and an online survey. The sample consisted of 388 mobile social networks users in Iran. The results indicate that sociability, entertainment and fashion are primary drivers of attitude toward a mobile social network. The results also show the significant role of attitude and satisfaction on consumer loyalty. This study helps both marketers and mobile social network providers know the key drivers of customer loyalty in order to tailor their marketing efforts and communication strategies.


2019 ◽  
pp. 097215091986886 ◽  
Author(s):  
Ameeta Jaiswal-Dale ◽  
Fanny Simon-Lee ◽  
Giovanna Zanotti ◽  
Peter Cincinelli

The aim of this research is to apply the tool of social network analysis to situations in capital sourcing, including early stage financing. The study is conducted within the social network of Medical Alley Association of Minnesota (MAA). We investigate the correlation between the main centrality measures: closeness, degree and betweenness, and the amount of funding received by the 163 MAA members during 2009–2012. Companies benefit from their social network to get access to better financing. The empirical results also provide a road map to encourage the sponsored or spontaneous growth of other social networks in related fields. Despite the financial crisis, the empirical results show how competition works when firms have established relations with others. Where an intersection occurs is merely an empirical curiosity and the causation resides in the intersection of relations. The relation that intersects on an organization determines the player’s competitive advantage.


Sign in / Sign up

Export Citation Format

Share Document