User-Friendly Security Patterns for Designing Social Network Websites

2017 ◽  
Vol 13 (1) ◽  
pp. 39-60 ◽  
Author(s):  
Khalid Alemerien

The number of users in Social Networking Sites (SNSs) is increasing exponentially. As a result, several security and privacy problems in SNSs have appeared. Part of these problems is caused by insecure Graphical User Interfaces (GUIs). Therefore, the developers of SNSs should take into account the balance between security and usability aspects during the development process. This paper proposes a set of user-friendly security patterns to help SNS developers to design interactive environments which protect the privacy and security of individuals while being highly user friendly. The authors proposed four patterns and evaluated them against the Facebook interfaces. The authors found that participants accepted the interfaces constructed through the proposed patterns more willingly than the Facebook interfaces.

Author(s):  
Willem De Groef ◽  
Dominique Devriese ◽  
Tom Reynaert ◽  
Frank Piessens

An important recent innovation on social networking sites is the support for plugging in third-party social applications. Together with the ever-growing number of social network users, social applications come with privacy and security risks for those users. While basic mechanisms for isolating applications are well understood, these mechanisms fall short for social-enabled applications. It is an interesting challenge to design and develop application platforms for social networks that enable the necessary functionality of social applications without compromising both users’ security and privacy. This chapter will identify and discuss the current security and privacy problems related to social applications and their platforms. Next, it will zoom in on proposals on how to address those problems.


Author(s):  
Stefania Manca ◽  
Maria Ranieri

Over recent years, the notions of identity, credibility and trust in digital contexts have been gaining renewed interest from scholars in different fields (from social studies to engineering and computer science), especially for their consequences for privacy and security. Emerging and urgent questions are: What does the management of online personal data entail? How much personal information are we entitled to share with others? What measures do people usually adopt to protect their identity and privacy? Are they always aware of the risks they may run? What consequences may emerge in the long term if cautions are ignored? These are some of the questions that should be addressed by users, experts and scholars engaged with digital environments, especially social networking sites. This chapter focuses on these issues trying to provide a wide overview of the current literature on identity, credibility and trust, and their implications for privacy and security, from the perspective of social and behavioral sciences. Some measures provided by experts on how to protect against the most common security and privacy threats are also outlined.


2014 ◽  
Author(s):  
Constantin SPÂNU

Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because of its large user base, and large amount of information, they become a potential channel for attackers to exploit. Many social networking sites try to prevent those exploitations, but many attackers are still able to overcome those security countermeasures by using different techniques. Social network users may not be aware of such threats. Therefore, this paper will present a survey on different privacy and security issues in online social networks. The issues include privacy issues, identity theft, social networks spam, social networks malware, and physical threats. Social network privacy issues, social network security issues, social network threats, identity Theft, social network spam, social network malware, Facebook worms, Twitter Worms.


Big data is gaining the popularity among the data scientist and the people from the Biology related disciplines. Big Data is very huge in volume and comes very fast from various sources. Millions of tweets or posts are generated per second on social networking sites. Big data has many issues of i.e. nature, storing, management, and processing, privacy and security in disclosing of attributes of the sensitive data in data of healthcare etc. For maintaining the privacy there are k-anonymity, psensitive k-anonymity, l-diversity, t-closeness, and k-concealment ways. In this paper an anonymity algorithm is proposed which will be used to enhance the security and privacy preserving of sensitive attributes of big data.


Author(s):  
Balamurugan. R ◽  
Dhivakar. M ◽  
Muruganantham. G ◽  
Ramprakash. S

This survey places of interest the major issues concerning privacy and security in online social networks. Firstly, we discuss investigate that aims to protect user data from the an assortment of attack vantage points together with other users, advertisers, third party request developers, and the online social arrangement provider itself. Next we cover social network supposition of user attributes, locate hubs, and link prediction. Because online social networks are so saturated with sensitive information, network inference plays a major privacy role. Social Networking sites go upwards since of all these reasons. In recent years indicates that for many people they are now the mainstream communication knowledge. Social networking sites come under few of the most frequently browsed categories websites in the world. Nevertheless Social Networking sites are also vulnerable to various problems threats and attacks such as revelation of information, identity thefts etc. Privacy practice in social networking sites often appear convoluted as in sequence sharing stands in discord with the need to reduce disclosure-related abuses. Facebook is one such most popular and widely used Social Networking sites which have its own healthy set of Privacy policy.


2021 ◽  
pp. 1-16
Author(s):  
Mirna Gilman Ranogajec ◽  
Boris Badurina

In today’s Information society it is an everyday scenario to be a part of an online community such as social media. Participation has become almost mandatory to the point of acting as a virtual extremity to one’s physical environment. This virtual extremity is the individual’s window to the outside world and vice versa. The process of being a part of social media has become very easy and user friendly where one is only a few private information entries away from communicating and connecting with the rest of the world. From the user’s perspective it may be a small price considering what it is gained from joining an online community, but with the rise of social networking platforms, arise privacy concerns regarding social networking services. It is questionable how many social media users consider the information they upload or post about online whether it’s their location, hobbies, employment places, age or any other private information. How many users actually read security and privacy terms when first registering for a social media account? What private information are individuals comfortable with entering and sharing on social networking sites? More and more loopholes are being found in social media frameworks that may compromise user’s privacy or that can be misused in a way that was not intended by the user. In 2010, the Google CEO Eric Schmidt was even quoted “… If we look at enough of your messaging and your location, and use artificial intelligence, we can predict where you are going to go.” (Snickars, Pelle, Vonderau, 2012). That line alone raised a lot of concerns and questions about how exactly is the information users put online being used.


Author(s):  
Roman Bruch ◽  
Paul M. Scheikl ◽  
Ralf Mikut ◽  
Felix Loosli ◽  
Markus Reischl

Behavioral analysis of moving animals relies on a faithful recording and track analysis to extract relevant parameters of movement. To study group behavior and social interactions, often simultaneous analyses of individuals are required. To detect social interactions, for example to identify the leader of a group as opposed to followers, one needs an error-free segmentation of individual tracks throughout time. While automated tracking algorithms exist that are quick and easy to use, inevitable errors will occur during tracking. To solve this problem, we introduce a robust algorithm called epiTracker for segmentation and tracking of multiple animals in two-dimensional (2D) videos along with an easy-to-use correction method that allows one to obtain error-free segmentation. We have implemented two graphical user interfaces to allow user-friendly control of the functions. Using six labeled 2D datasets, the effort to obtain accurate labels is quantified and compared to alternative available software solutions. Both the labeled datasets and the software are publicly available.


2011 ◽  
Vol 464 ◽  
pp. 57-60
Author(s):  
Yong Zhang ◽  
Jun Fang Ni ◽  
Peng Liu

In accordance with the object-oriented programming, a system for 3D medical images of reconstruction and display has been designed and implemented. The overall software structure is established based on VC++6.0 and display technique of Open Graphics Library. The functional modules, such as acquisition of encoded 3D data, pre-process, reconstruction and display, are achieved by the design and implementation of customized classes. At last the software system provides user-friendly graphical user interfaces, highly efficient data processing and reconstruction, and rapid capability of graphic display.


Author(s):  
Maryam Salahshour ◽  
Halina Mohamed Dahlan ◽  
Noorminshah A. Iahad

Social networking tools have become an integral part of our daily lives. Recently, a new type of Social Networking Sites (SNSs) namely Academic Social Networking sites (ASNSs) has attracted global users. There is perceived usefulness on the impact of ASNSs on patterns of academic research activities. However, it remains unclear why some researchers do not use ASNSs at all. The purpose of this paper is therefore to explore the ASNSs usage among Malaysian academic researchers and to investigate benefits, specific purpose, drivers and barriers of using ASNSs. A total of 210 completed cases were collected through paper-based and online-based questionnaire. In order to show the outcome of the research, descriptive interpretation of data is performed. The overall findings of this research indicate that there is low rate of ASNSs usage among researchers. In addition, the results show that colleagues, attitude toward technology and communication benefits are the drivers to use ASNSs and trust, privacy and security are the common barriers regarding to use ASNSs.


Author(s):  
George Veletsianos ◽  
Cesar Navarrete

<p>While the potential of social networking sites to contribute to educational endeavors is highlighted by researchers and practitioners alike, empirical evidence on the use of such sites for formal online learning is scant. To fill this gap in the literature, we present a case study of learners’ perspectives and experiences in an online course taught using the Elgg online social network. Findings from this study indicate that learners enjoyed and appreciated both the social learning experience afforded by the online social network and supported one another in their learning, enhancing their own and other students’ experiences. Conversely, results also indicate that students limited their participation to course-related and graded activities, exhibiting little use of social networking and sharing. Additionally, learners needed support in managing the expanded amount of information available to them and devised strategies and “workarounds” to manage their time and participation.<br /><strong></strong></p>


Sign in / Sign up

Export Citation Format

Share Document