Skip to main content

Computational Social Networks: Security and Privacy

  • Chapter
  • First Online:
Computational Social Networks

Abstract

The continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the Web only but also with trusted groups that may also contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and stealing information about users. These attacks are not only affecting individuals but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter presents an overview of the social networks security and privacy issues and illustrates the various security risks and the tasks applied to minimize those risks. In addition, this chapter explains some of the common strategies that attackers often use and some possible counter measures against such issues.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Abadi, M., Jalili, S.: An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng. 2(3), 106–120 (2006)

    Google Scholar 

  2. Abadie, A., Gardeazabal, J.: Terrorism and the world economy. Eur. Econ. Rev. 52(1), 1–27 (2008)

    Article  Google Scholar 

  3. Antheunis, M.L., Valkenburg, P.M., Peter, J.: Getting acquainted through social network sites: testing a model of online uncertainty reduction and social attraction. Comput. Hum. Behav. 26, 100–109 (2010)

    Article  Google Scholar 

  4. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput. Commun. Rev. 39(4), 50–55 (2009)

    Article  Google Scholar 

  5. Barracuda Networks Inc.: Social Networking Security and Privacy Study. Barracuda Labs, Belgium (2011)

    Google Scholar 

  6. Barrigar, J.: Social network site privacy: a comparative analysis of six sites. The Office of the Privacy Commissioner of Canada, Feb 2009. http://www.priv.gc.ca/information/pub/sub_comp_200901_e.pdf. Accessed on Feb 2012

  7. Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.U.: Complex networks: structure and dynamics. Phys. Rep.424, 175–308 (2006)

    Article  MathSciNet  Google Scholar 

  8. Boyd, D., Ellison, N.: Social network sites: definition, history and scholarship. J. Comput. Mediat. Commun. 13(1), 210–230 (2007)

    Article  Google Scholar 

  9. Carley, K.M.: Dynamic network analysis. In: Breiger, R., Carley, K., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 133–145. Committee on Human Factors, National Research Council, Washington, DC (2003)

    Google Scholar 

  10. Costa, L.F., Rodrigues, F.A., Travieso, G., Boas, P.R.V.: Characterization of complex networks: a survey of measurements. Adv. Phys. 56, 167–242 (2007)

    Article  Google Scholar 

  11. Czinkota, M.R., Knight, G.A., Liesch, P.W., Steen, J.: Positioning terrorism in management and marketing: research propositions. J. Int. Manage. 11(4), 581–604 (2005)

    Article  Google Scholar 

  12. Das, K., Bhaduri, K., Kargupta, H.: A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks. Knowl. Inf. Syst. J. 24(3), 341–367 (2009)

    Article  Google Scholar 

  13. De Nooy, W., AMrvar, A., Batagelig, V.: Exploratory Social Network Analysis with Pajek. Cambridge university press, New York (2004)

    Google Scholar 

  14. Douceur. J.: The Sybil attack. In: First International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, pp. 251–260 (2002)

    Google Scholar 

  15. Erola, A., Castell-Roca, J., Viejo, A., Mateo-Sanz, J.M.: Exploiting social networks to provide privacy in personalized web search. J. Syst. Softw. 84(10), 1734–1745 (2011)

    Article  Google Scholar 

  16. Felt, A., Evans, D.: Privacy protection for social networking APIs, In Proceedings of Web 2.0 Security and Privacy (W2SP 2009), Oakland, California (2009)

    Google Scholar 

  17. Felt, A., Evans, D.: Privacy Protection for Social Networking APIs. University of Virginia Charlottesville, Virginia (2008)

    Google Scholar 

  18. Freeman, L.: Visualizing social network. J. Soc. Struct. 1(1), 151–161 (2000)

    Google Scholar 

  19. Freeman, L.C.: Social network visualization. In: Methods of Encyclopedia of Complexity and Systems Science, pp. 8345–8363 (2009)

    Google Scholar 

  20. Frey, B.S.: How can business cope with terrorism? J. Policy Model. 31(5), 779–787 (2009)

    Article  MathSciNet  Google Scholar 

  21. Grace, J., Gruhl, D., et al.: Artist remains: through analysis of on-line community comments. In proc. of J. Grace edns, (2007)

    Google Scholar 

  22. Granger, S.: Social engineering fundamentals, part I: hacker tactics. (cited 5/12/11). Available on: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics, (2001)

  23. Gross, R., Acquisti, A.: Information revelation and privacy in online social networking sites (the facebook case). Available at: http://www.fastcompany.com/articles/2008/10/social-networking-security.html. Accessed 8 Jan 2012

  24. Halgin, D.: An introduction to UCINET and NetDraw. In: Proceedings of the NIPS UCINET and NetDraw Workshop 2008, Harvard University, pp. 1–47 (2008)

    Google Scholar 

  25. Hi5: http://hi5.com. Accessed on 2011

  26. Internet world stats: http://www.internetworldstats.com/stats.htm (2008)

  27. Kadushin, C.: Who benefits from network analysis: ethics of social network research. Soc. Netw. 27, 139–145 (2005)

    Article  Google Scholar 

  28. Koh, W.T.H.: Terrorism and its impact on economic growth and technological innovation. Technol. Forecast. Soc. Change 74(2), 129–138 (2007)

    Article  Google Scholar 

  29. Kollias, C., Messis, P., Mylonidis, N., Paleologou, S.: Terrorism and the effectiveness of security spending in Greece: policy implications of some empirical indings. J. Policy Model. 31(5), 788–802 (2009)

    Article  Google Scholar 

  30. Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. IEEE Comput. 42, 30–37 (2009)

    Article  Google Scholar 

  31. Krebs, V.E.: Uncloaking terrorist networks. First Monday 7, (2002)

    Google Scholar 

  32. Lee, D., Seung, H.: Learning the parts of objects by non-negative matrix factorization. Nature 401, 788–791 (1999)

    Article  Google Scholar 

  33. Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inf. Sci. Technol. 58, 1019–1031 (2007)

    Article  Google Scholar 

  34. LinkedIn: http://www.linkedin.com. Accessed on 2012

  35. LiveJournal: http://www.livejournal.com. Accessed on 2012

  36. Matsuo, Y., et al.: Polyphonet: an advanced social network extraction system from the web. In: Proceedings of the International Conference on World Wide Web (www 06), New York, pp. 397–406 (2006)

    Google Scholar 

  37. Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Proceedings of the 8th International Conference of Information Security and Cryptology (ICISC 2005), Seoul Korea, pp.186–198 (2005)

    Google Scholar 

  38. McDowell, M., Morda, D.: Socializing securely: using social networking services. United States Computer Emergency Readiness Team (US-CERT ), Washington, DC (2011)

    Google Scholar 

  39. Moor, J.H.: Towards a theory of privacy for the information age. SIGCAS Comput. Soc. 40(2), 31–34 (2010)

    Article  Google Scholar 

  40. Moustafa, W., Deshpande, A., Namata, G., Getoor, L.: Declarative analysis of noisy information networks. In: Proceedings of the IEEE 27th International Conference on Department of Computer Science, Data Engineering Workshops (ICDEW), Hannover, pp. 106–111, (2011)

    Google Scholar 

  41. MySpace: http://www.myspace.com

  42. Netcraft: http://news.netcraft.com (2009)

  43. Paraskevas, A., Arendell, B.: A strategic framework for terrorism prevention and mitigation in tourism destinations. Tour. Manage. 28(6), 1560–1573 (2007)

    Article  Google Scholar 

  44. PhishingTank: What is phishing? (cited 6/12/11). Available from: http://www.phishtank.com/what-is-phishing.php

  45. PricewaterhouseCoopers: Security for social networking. Available on: http://www.pwc.com/en_US/us/it-risk-security/assets/security-social-networking.pdf, (2010)

  46. Reid, E.F., Chen, H.: Mapping the contemporary terrorism research domain. Int. J. Hum. Comput. Stud. 65(1), 42–56 (2007)

    Article  Google Scholar 

  47. Sancho, D.: Security guide to social networks, A Trend Micro White Paper, Aug, (2009).

    Google Scholar 

  48. schrock, A.: Examining social media usage: technology clusters and social network relationships. First Monday 14(1), (2009)

    Google Scholar 

  49. Shani, G., Chickering, M., Meek, C.: Mining recommendations from the web. In: Proceedings of the 2008 ACM Conference on Recommender System, Lausanne, pp. 35–42 (2008)

    Google Scholar 

  50. Sheldon, P.: The relationship between unwillingness to communicate and students Facebook use. J Media Psychol. Theor. Method Appl. 20(2), 67–75 (2008)

    Google Scholar 

  51. Skyrock: http://www.Skyrock.com. Accessed on 2012

  52. Snasel, V., Horak, Z., Abraham, A.: Link suggestions in terrorists networks using semi discrete decomposition. In: Sixth International Conference on Information Assurance and Security (IAS), USA, IEEE, ISBN 978-1-4244-7408-0, pp. 337–339 (2010)

    Google Scholar 

  53. Soghoian, C.: Hackers target facebook apps. CNet News, (cited 5/12/11). Available from: http://news.cnet.com/8301-13739-3-9904331-46.html (2008)

  54. Solanas, A.: Privacy protection with genetic algorithms. Stud. Computat. Intel. 92, 215–237 (2008)

    Article  Google Scholar 

  55. Tantipathananandh, C., Breger-wolf, T., Kempe, D.: A framework for community identification in dynamic Social network. In: Proceedings of the KDD 2007, San Jose, CA, USA, pp. 717–726 (2007)

    Google Scholar 

  56. Thellwal, M.: Social networks, gender and friending, analysis of myspace profiles. J. Am. Soc. Inf. Sci. Technol. 591(8), 1321–1330 (2008)

    Article  Google Scholar 

  57. Tufekci, Z.: Grroming, gossip facebook and myspace: what can we learn about these sites from those who wont assimilate? Inf. Commun. Soc. 11(4), 544–564 (2008)

    Article  Google Scholar 

  58. http://www.facebook.com/note.php?note_id=324110600939875. Accessed on 2012

  59. http://en.wikipedia.org/wiki/Betweenness. Accessed on 2012

  60. http://www.facebook.com. Accessed on 2012

  61. Walther, J., Vander Heide, B., Kim, S., Westerman, D., Tang, S.T.: The role of friends appearance and behaviour on evaluations of individuals on facebook: are we known by the company we keep? Hum. commun. Res. 34, 28–49 (2008)

    Article  Google Scholar 

  62. Wolf, Y., Frankel, O.: Terrorism: toward an overarched account and prevention with a special reference to pendulum interplay between both parties. Aggress. Viol. Behav. 12(3), 259–279 (2007)

    Article  Google Scholar 

  63. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. SIGCOMM’06 16(3), 576–589 (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mostafa Salama .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag London

About this chapter

Cite this chapter

Salama, M., Panda, M., Elbarawy, Y., Hassanien, A.E., Abraham, A. (2012). Computational Social Networks: Security and Privacy. In: Abraham, A. (eds) Computational Social Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4051-1_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-4051-1_1

  • Published:

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-4471-4050-4

  • Online ISBN: 978-1-4471-4051-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics