Information Attacks on Online Social Networks

2014 ◽  
Vol 7 (3) ◽  
pp. 54-71 ◽  
Author(s):  
Enrico Franchi ◽  
Agostino Poggi ◽  
Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.

2015 ◽  
Vol 8 (1) ◽  
pp. 25-42 ◽  
Author(s):  
Enrico Franchi ◽  
Agostino Poggi ◽  
Michele Tomaiuolo

Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


2015 ◽  
Vol 40 (2) ◽  
pp. 89-105 ◽  
Author(s):  
Muhammad Abulaish ◽  
Sajid Y. Bhat

Abstract As the online social network technology is gaining all time high popularity and usage, the malicious behavior and attacks of spammers are getting smarter and difficult to track. The newer spamming approaches using the social engineering concepts are making traditional spam and spammer detection techniques obsolete. Especially, content-based filtering of spam messages and spammer profiles in online social networks is becoming difficult. Newer approaches for spammer detection using topological features are gaining attention. Further, the evaluation of ensemble classifiers for detection of spammers over social networking behavior-based features is still in its infancy. In this paper, we present an ensemble learning method for online social network security by evaluating the performance of some basic ensemble classifiers over novel community-based social networking features of legitimate users and spammers in online social networks. The proposed method aims to identify topological and community-based features from users’ interaction network and uses popular classifier ensembles – bagging and boosting to identify spammers in online social networks. Experimental evaluation of the proposed method is done over a real-world data set with artificial spammers that follow a behavior as reported in earlier literature. The experimental results reveal that the identified features are highly discriminative to identify spammers in online social networks.


2015 ◽  
Vol 4 (4) ◽  
pp. 354-363
Author(s):  
Akwesi Assensoh-Kodua ◽  
Knowledge Siyabonga Vusamandla Ngwane

This paper tests the factors likely to impact continuance intentions through the medium of online social networks (OSN) for business transactions. The expectation-confirmation theory (ECT) from the consumer behaviour literature is made use of; to forward a set of theories that validate a prior model from IS usage research. Eight research hypotheses, after a field survey of OSNs participants for business transactions were conducted are empirically validated. 300 useable responses from LinkedIn and Twitter social networking platforms users for business transactions were analysed with the WarpPLS 4.0 bootstrapping technique. The study results provide significant evidence in support of perceived trust and user satisfaction, as determinants of the continuance intention of people using OSN platforms for business transactions. Above all, the research model was tested for the moderating effects of usage habit, which was found to impact relationships between continuance intention and perceived trust, resulting in an improved predictive capability of (R2=0.55) as compared to base model of (R2=0.52). The moderating result indicates that a higher level of habit increases the effect of perceived trust on continuance intention.


Author(s):  
José Poças Rascão ◽  
Nuno Gonçalo Poças

The article is about human rights freedom of expression, the right to privacy, and ethics. Technological development (internet and social networks) emphasizes the issue of dialectics and poses many challenges. It makes the theoretical review, the history of human rights through and reference documents, an analysis of the concepts of freedom, privacy, and ethics. The internet and social networks pose many problems: digital data, people's tracks, the surveillance of citizens, the social engineering of power, online social networks, e-commerce, spaces of trust, and conflict.


Author(s):  
Vladlena Benson

Based on the literature review of the theory of trust, this chapter aims to provide an insight into trust formation on social networking sites (SNS). An overview of the current state of cybercrime and known ways of threat mitigation helps shed some light on the reasons why social networks became easy targets for Internet criminals. Increasingly, personalisation is seen as a method for counteracting attacks perpetrated via phishing messages. This chapter aims to look specifically at trust in online social networks and how it influences vulnerability of users towards cybercrime. The chapter poses a question whether personalisation is the silver bullet to combat cyber threats on social networks. Further research directions are discussed.


2011 ◽  
pp. 491-507
Author(s):  
Avimanyu Datta ◽  
Len Jessup

The authors present a parsimonious theoretical model that illustrates how Internet-based virtual environments (such as social networking Web sites) moderate the relationship between social networks and social entrepreneurship. Social networks promote social entrepreneurship by means of (a) technology and knowledge transfer; (b) locating information; (c) generating entrepreneurial opportunities; (d) building entrepreneurial competency; (e) financing innovation; and (f) building effective networks for commercialization of innovations. Internet based virtual environments increase the velocity with which online social networks are formed and operationalized. They, thus, have a moderating effect in the relationship between social networks and social entrepreneurship. The authors also represent three concepts that are core to social networks: density, centrality, and heterogeneity. They posit that all three explain variance in social entrepreneurship and that Internet-based virtual environments moderate each of the relationships these three elements of social networks have with social entrepreneurship.


2010 ◽  
pp. 911-919 ◽  
Author(s):  
Vassilis Kostakos ◽  
Eamonn O’Neill

In this paper, we describe a platform that enables us to systematically study online social networks alongside their real-world counterparts. Our system, entitled Cityware, merges users’ online social data, made available through Facebook, with mobility traces captured via Bluetooth scanning. Furthermore, our system enables users to contribute their own mobility traces, thus allowing users to form and participate in a community. In addition to describing Cityware’s architecture, we discuss the type of data we are collecting, and the analyses our platform enables, as well as users’ reactions and thoughts.


Author(s):  
Kamna Malik

Research conferences provide an important platform for idea exchange and validation as well as for social networking and talent hunt. Online social networks and collaborative web tools can make conferences budget friendly for sponsors, flexible for attendees, and environment friendly for the society without loss of effectiveness. While many conferences have adopted such tools during pre and post conferencing stages, their use during actual meeting hours is very limited. This paper deliberates on the current and potential use of such technologies on various stages of a conference. It then presents the case of a pure virtual conference in comparison with a face to face conference with an aim to analyze the immediate benefits that virtual conferencing brings for organizers and participants. Perceived deterrents and potential benefits for various stakeholders are discussed. Suggestions are made for educational institutions to review their norms for conference sponsorships.


2019 ◽  
Vol 38 (3) ◽  
pp. 461-480 ◽  
Author(s):  
Monic Sun ◽  
Xiaoquan (Michael) Zhang ◽  
Feng Zhu

Conformity toward the majority choice among a user’s friends on a social-networking site first decreases and then increases with the adoption rate of that choice.


Sign in / Sign up

Export Citation Format

Share Document