scholarly journals Img-Shelter : Privacy Protection of Images In Online Social Networks Using Watermarking Scheme

Author(s):  
P. Ponvasan ◽  
M. Muthusangari

Social networking sites are very useful in sharing information, making friends and keeping in touch with old friends. It is an online service, platform, or site that focuses on facilitating the building of social networks and social elation among peoples for sharing interests, activities, backgrounds, or real-life connections. But with the increasing demand of social networking sites (SNS) privacy and security concern have also increased. Protecting personal information privacy has become a controversial issue among online social network providers and users. Most social network providers have developed several techniques to decrease threats and risks to the users’ privacy. These risks include the misuse of personal information which may lead to illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their personal information privacy, as well as the suitability of the privacy systems which they use to modify privacy settings. In this paper, categorize the picture as sensitive or normal. If it is sensitive means, perform copyrights algorithms. Then provide the permission to the receiver end for download the images in secure manner. Experimental result can be shows that in real time environments using C#.NET as front end and SQL SERVER as back end and comparative study of existing algorithms based on computational time and privacy rate.

2014 ◽  
Author(s):  
Constantin SPÂNU

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.


Author(s):  
Balamurugan. R ◽  
Dhivakar. M ◽  
Muruganantham. G ◽  
Ramprakash. S

This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.


Author(s):  
George Veletsianos ◽  
Cesar Navarrete

<p>While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.<br /><strong></strong></p>


Author(s):  
Vladlena Benson

Based on the literature review of the theory of trust, this chapter aims to provide an insight into trust formation on social networking sites (SNS). An overview of the current state of cybercrime and known ways of threat mitigation helps shed some light on the reasons why social networks became easy targets for Internet criminals. Increasingly, personalisation is seen as a method for counteracting attacks perpetrated via phishing messages. This chapter aims to look specifically at trust in online social networks and how it influences vulnerability of users towards cybercrime. The chapter poses a question whether personalisation is the silver bullet to combat cyber threats on social networks. Further research directions are discussed.


2013 ◽  
Vol 3 (2) ◽  
pp. 22-37
Author(s):  
N. Veerasamy ◽  
W. A. Labuschagne

The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.


Author(s):  
Jaymeen R. Shah ◽  
Hsun-Ming Lee

During the next decade, enrollment growth in Information Systems (IS) related majors is unlikely to meet the predicted demand for qualified IS graduates. Gender imbalance in the IS related program makes the situation worse as enrollment and retention of women in the IS major has been proportionately low compared to male. In recent years, majority of high school and college students have integrated social networking sites in their daily life and habitually use these sites. Providing female students access to role models via an online social network may enhance their motivation to continue as an IS major and pursue a career in IS field. For this study, the authors follow the action research process – exploration of information systems development. In particular, a Facebook application was developed to build the social network connecting role models and students. Using the application, a basic framework is tested based on the gender of participants. The results suggest that it is necessary to have adequate number of role models accessible to students as female role-models tend to select fewer students to develop relationships with a preference for female students. Female students likely prefer composite role models from a variety of sources. This pilot study yields valuable lessons to provide informal learning fostered by role modeling via online social networks. The Facebook application may be further expanded to enhance female students' interests in IS related careers.


Author(s):  
Ryan Bigge

The media coverage and resultant discourse surrounding social networking sites such as Facebook, MySpace and Friendster contain narratives of inevitability and technological determinism that require careful explication. Borrowing a tactic from the Russian Futurists, this paper attempts to make strange (that is, to defamiliarize) social network sites and their associated discourses by drawing upon an eclectic but interrelated set of metaphors and theoretical approaches, including: the digital enclosure, network sociality, socio-technical capital and Steven Jones’s recent examination of neo-Luddites. Whenever appropriate, this paper will integrate relevant magazine and newspaper journalism about social networking sites.


Author(s):  
Rawan T. Khasawneh

During the fast growth of social media, the ways companies usually use in their marketing are changed; social networks became a great approach for companies to improve their communication with customers. The wide usage of social networking sites and tools by individuals makes companies want to think carefully on how they can benefit from such usage in rebuilding their relationship with customers and increasing their engagement level. Such companies found that social media marketing is the solution through which companies and their customers will become much closer. This chapter covers three main sections where traditional marketing and electronic marketing concepts are reviewed in the first section. Then a detailed exploration of social networks and their distinct features is presented in the second section. Finally a discussion of social network marketing tools and its related technologies is explored in the third section.


Author(s):  
Anas Alahmed

In non-democratic societies new media social networks have played a significant role in changing political and social positions, not necessarily through real life but, instead, through cyber life. This chapter examines how Saudi activists challenge the political authority and how Saudi citizens took advantage of publicity by demanding political change. All of this happened due to social networks and new media, which allowed citizens to mobilize information for the sake of transparency. This was a new phenomenon in Saudi Arabia. The current young generation of Saudis, who use the Internet and social networking sites, played a significant role in the public sphere by making use of the space available to them within cyberspace. This chapter discusses the potential of political information to flourish in Saudi Arabia. It examines how and why citizen activism in Saudi Arabia can be effective. The chapter also shows that social networking activities have the power to change political decisions and society.


Author(s):  
Giulio Angiani ◽  
Paolo Fornacciari ◽  
Eleonora Iotti ◽  
Monica Mordonini ◽  
Michele Tomaiuolo

Why and how more and more people get involved and use social networking systems are critical topics in social network analysis (SNA). As a matter of fact, social networking systems bring online a growing number of acquaintances, for many different purposes. Both business interests and personal recreational goals are motivations for using online social networks (OSN) or other social networking systems. The participation in social networks is a phenomenon which has been studied with several theories, and SNA is useful for common business problems, e.g., launching distributed teams, retaining people with vital knowledge for the organization, improving access to knowledge and spreading ideas and innovation. Nevertheless, there are some difficulties, such as anti-social behaviors of participants, lack of incentives, organizational costs and risks. In this article, a survey of the basic features of SNA, participation theories and models are discussed, with emphasis on social capital, information spreading, motivations for participation, and anti-social behaviors of social network users.


Sign in / Sign up

Export Citation Format

Share Document