Information Attacks and Defenses on the Social Web

Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.

2015 ◽  
Vol 8 (1) ◽  
pp. 25-42 ◽  
Author(s):  
Enrico Franchi ◽  
Agostino Poggi ◽  
Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2014 ◽  
Vol 7 (3) ◽  
pp. 54-71 ◽  
Author(s):  
Enrico Franchi ◽  
Agostino Poggi ◽  
Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2011 ◽  
pp. 491-507
Author(s):  
Avimanyu Datta ◽  
Len Jessup

The authors present a parsimonious theoretical model that illustrates how Internet-based virtual environments (such as social networking Web sites) moderate the relationship between social networks and social entrepreneurship. Social networks promote social entrepreneurship by means of (a) technology and knowledge transfer; (b) locating information; (c) generating entrepreneurial opportunities; (d) building entrepreneurial competency; (e) financing innovation; and (f) building effective networks for commercialization of innovations. Internet based virtual environments increase the velocity with which online social networks are formed and operationalized. They, thus, have a moderating effect in the relationship between social networks and social entrepreneurship. The authors also represent three concepts that are core to social networks: density, centrality, and heterogeneity. They posit that all three explain variance in social entrepreneurship and that Internet-based virtual environments moderate each of the relationships these three elements of social networks have with social entrepreneurship.


Author(s):  
Athanasios Kokkos ◽  
Theodoros Tzouramanis

Online social networking services have come to dominate the dot com world: Countless online communities coexist on the social Web. Some typically characteristic user attributes, such as gender, age group, sexual orientation, are not automatically part of the profile information. In some cases user attributes can even be deliberately and maliciously falsified. This paper examines automated inference of gender on online social networks by analyzing written text with a combination of natural language processing and classification techniques. Extensive experimentation on LinkedIn and Twitter has yielded accuracy of this gender identification technique of up to 98.4 percent.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


Author(s):  
Avimanyu Datta ◽  
Len Jessup

The authors present a parsimonious theoretical model that illustrates how Internet-based virtual environments (such as social networking Web sites) moderate the relationship between social networks and social entrepreneurship. Social networks promote social entrepreneurship by means of (a) technology and knowledge transfer; (b) locating information; (c) generating entrepreneurial opportunities; (d) building entrepreneurial competency; (e) financing innovation; and (f) building effective networks for commercialization of innovations. Internet based virtual environments increase the velocity with which online social networks are formed and operationalized. They, thus, have a moderating effect in the relationship between social networks and social entrepreneurship. The authors also represent three concepts that are core to social networks: density, centrality, and heterogeneity. They posit that all three explain variance in social entrepreneurship and that Internet-based virtual environments moderate each of the relationships these three elements of social networks have with social entrepreneurship.


E-Marketing ◽  
2012 ◽  
pp. 803-813 ◽  
Author(s):  
T. Andrew Yang ◽  
Dan J. Kim

In the world of e-marketing, new business models are introduced to accommodate changes caused by various factors, including the markets, the services, the customers, among others. One latest trend of e-marketing is social networking Web sites, many of which have attracted not only large number of users and visitors, but also business companies to place their online ads on the sites. As an important example of Web 2.0 applications, online social networks deserve comprehensive studying and analysis; they are not only employed as an effective vehicle of e-marketing, but may impact how future Web-based applications would be developed. In this chapter, we explore online social networking as a new trend of e-marketing, by conducting a comparative analysis of online social networking sites. We first discuss the various types of online social networks, based on the classification by Laudon & Traver (2008), and then analyze online social networks from a business strategy point of view, by discussing the primary revenue models for online social networking sites. The primary contribution of this chapter is a comparative analysis and discussions of representative online social networking sites and their respective revenue model(s). This chapter aims to provide the reader with a basic understanding of the emerging online social networking Web sites and their primary revenue models.


Author(s):  
Suradej Intagorn ◽  
Kristina Lerman

Up-to-date geospatial information can help crisis management community to coordinate its response. In addition to data that is created and curated by experts, there is an abundance of user-generated, user-curated data on Social Web sites such as Flickr, Twitter, and Google Earth. User-generated data and metadata can be used to harvest knowledge, including geospatial knowledge that will help solve real-world problems including information discovery, geospatial information integration and data management. This paper proposes a method for acquiring geospatial knowledge in the form of places and relations between them from the user-generated data and metadata on the Social Web. The key to acquiring geospatial knowledge from social metadata is the ability to accurately represent places. The authors describe a simple, efficient algorithm for finding a non-convex boundary of a region from a sample of points from that region. Used within a procedure that learns part-of relations between places from real-world data extracted from the social photo-sharing site Flickr, the proposed algorithm leads to more precise relations than the earlier method and helps uncover knowledge not contained in expert-curated geospatial knowledge bases.


Author(s):  
T. Andrew Yang ◽  
Dan J. Kim

In the world of e-marketing, new business models are introduced to accommodate changes caused by various factors, including the markets, the services, the customers, among others. One latest trend of e-marketing is social networking Web sites, many of which have attracted not only large number of users and visitors, but also business companies to place their online ads on the sites. As an important example of Web 2.0 applications, online social networks deserve comprehensive studying and analysis; they are not only employed as an effective vehicle of e-marketing, but may impact how future Web-based applications would be developed. In this chapter, we explore online social networking as a new trend of e-marketing, by conducting a comparative analysis of online social networking sites. We first discuss the various types of online social networks, based on the classification by Laudon & Traver (2008), and then analyze online social networks from a business strategy point of view, by discussing the primary revenue models for online social networking sites. The primary contribution of this chapter is a comparative analysis and discussions of representative online social networking sites and their respective revenue model(s). This chapter aims to provide the reader with a basic understanding of the emerging online social networking Web sites and their primary revenue models.


Author(s):  
Dhrubasish Sarkar ◽  
Dipak K. Kole ◽  
Premananda Jana

The increasing popularity of Online Social Networks (OSNs), its complex and rapidly growing structure, its potential impact on business, politics, healthcare and society has led to a great deal of interest in the development of efficient influential nodes identification algorithms. Different kind of business organizations are trying to use the social networking sites to reach the target audience quickly and efficiently in terms of cost and time. The influential nodes can play an important role in it. In this paper the features of social network, models of social networks and different models or approaches used for identifying influential nodes in online social networks have been studied.


Sign in / Sign up

Export Citation Format

Share Document