Abstract
The continuous self-growing nature of social networks makes it hard to define a line of safety around these networks. Users in social networks are not interacting with the Web only but also with trusted groups that may also contain enemies. There are different kinds of attacks on these networks including causing damage to the computer systems and stealing information about users. These attacks are not only affecting individuals but also the organizations they are belonging to. Protection from these attacks should be performed by the users and security experts of the network. Advices should be provided to users of these social networks. Also security experts should be sure that the contents transmitted through the network do not contain malicious or harmful data. This chapter presents an overview of the social networks security and privacy issues and illustrates the various security risks and the tasks applied to minimize those risks. In addition, this chapter explains some of the common strategies that attackers often use and some possible counter measures against such issues.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Abadi, M., Jalili, S.: An ant colony optimization algorithm for network vulnerability analysis. Iran. J. Electr. Electron. Eng. 2(3), 106–120 (2006)
Abadie, A., Gardeazabal, J.: Terrorism and the world economy. Eur. Econ. Rev. 52(1), 1–27 (2008)
Antheunis, M.L., Valkenburg, P.M., Peter, J.: Getting acquainted through social network sites: testing a model of online uncertainty reduction and social attraction. Comput. Hum. Behav. 26, 100–109 (2010)
Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. ACM SIGCOMM Comput. Commun. Rev. 39(4), 50–55 (2009)
Barracuda Networks Inc.: Social Networking Security and Privacy Study. Barracuda Labs, Belgium (2011)
Barrigar, J.: Social network site privacy: a comparative analysis of six sites. The Office of the Privacy Commissioner of Canada, Feb 2009. http://www.priv.gc.ca/information/pub/sub_comp_200901_e.pdf. Accessed on Feb 2012
Boccaletti, S., Latora, V., Moreno, Y., Chavez, M., Hwang, D.U.: Complex networks: structure and dynamics. Phys. Rep.424, 175–308 (2006)
Boyd, D., Ellison, N.: Social network sites: definition, history and scholarship. J. Comput. Mediat. Commun. 13(1), 210–230 (2007)
Carley, K.M.: Dynamic network analysis. In: Breiger, R., Carley, K., Pattison, P. (eds.) Dynamic Social Network Modeling and Analysis: Workshop Summary and Papers, pp. 133–145. Committee on Human Factors, National Research Council, Washington, DC (2003)
Costa, L.F., Rodrigues, F.A., Travieso, G., Boas, P.R.V.: Characterization of complex networks: a survey of measurements. Adv. Phys. 56, 167–242 (2007)
Czinkota, M.R., Knight, G.A., Liesch, P.W., Steen, J.: Positioning terrorism in management and marketing: research propositions. J. Int. Manage. 11(4), 581–604 (2005)
Das, K., Bhaduri, K., Kargupta, H.: A local asynchronous distributed privacy preserving feature selection algorithm for large peer-to-peer networks. Knowl. Inf. Syst. J. 24(3), 341–367 (2009)
De Nooy, W., AMrvar, A., Batagelig, V.: Exploratory Social Network Analysis with Pajek. Cambridge university press, New York (2004)
Douceur. J.: The Sybil attack. In: First International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, pp. 251–260 (2002)
Erola, A., Castell-Roca, J., Viejo, A., Mateo-Sanz, J.M.: Exploiting social networks to provide privacy in personalized web search. J. Syst. Softw. 84(10), 1734–1745 (2011)
Felt, A., Evans, D.: Privacy protection for social networking APIs, In Proceedings of Web 2.0 Security and Privacy (W2SP 2009), Oakland, California (2009)
Felt, A., Evans, D.: Privacy Protection for Social Networking APIs. University of Virginia Charlottesville, Virginia (2008)
Freeman, L.: Visualizing social network. J. Soc. Struct. 1(1), 151–161 (2000)
Freeman, L.C.: Social network visualization. In: Methods of Encyclopedia of Complexity and Systems Science, pp. 8345–8363 (2009)
Frey, B.S.: How can business cope with terrorism? J. Policy Model. 31(5), 779–787 (2009)
Grace, J., Gruhl, D., et al.: Artist remains: through analysis of on-line community comments. In proc. of J. Grace edns, (2007)
Granger, S.: Social engineering fundamentals, part I: hacker tactics. (cited 5/12/11). Available on: http://www.symantec.com/connect/articles/social-engineering-fundamentals-part-i-hacker-tactics, (2001)
Gross, R., Acquisti, A.: Information revelation and privacy in online social networking sites (the facebook case). Available at: http://www.fastcompany.com/articles/2008/10/social-networking-security.html. Accessed 8 Jan 2012
Halgin, D.: An introduction to UCINET and NetDraw. In: Proceedings of the NIPS UCINET and NetDraw Workshop 2008, Harvard University, pp. 1–47 (2008)
Hi5: http://hi5.com. Accessed on 2011
Internet world stats: http://www.internetworldstats.com/stats.htm (2008)
Kadushin, C.: Who benefits from network analysis: ethics of social network research. Soc. Netw. 27, 139–145 (2005)
Koh, W.T.H.: Terrorism and its impact on economic growth and technological innovation. Technol. Forecast. Soc. Change 74(2), 129–138 (2007)
Kollias, C., Messis, P., Mylonidis, N., Paleologou, S.: Terrorism and the effectiveness of security spending in Greece: policy implications of some empirical indings. J. Policy Model. 31(5), 788–802 (2009)
Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. IEEE Comput. 42, 30–37 (2009)
Krebs, V.E.: Uncloaking terrorist networks. First Monday 7, (2002)
Lee, D., Seung, H.: Learning the parts of objects by non-negative matrix factorization. Nature 401, 788–791 (1999)
Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks. J. Am. Soc. Inf. Sci. Technol. 58, 1019–1031 (2007)
LinkedIn: http://www.linkedin.com. Accessed on 2012
LiveJournal: http://www.livejournal.com. Accessed on 2012
Matsuo, Y., et al.: Polyphonet: an advanced social network extraction system from the web. In: Proceedings of the International Conference on World Wide Web (www 06), New York, pp. 397–406 (2006)
Mauw, S., Oostdijk, M.: Foundations of attack trees. In: Proceedings of the 8th International Conference of Information Security and Cryptology (ICISC 2005), Seoul Korea, pp.186–198 (2005)
McDowell, M., Morda, D.: Socializing securely: using social networking services. United States Computer Emergency Readiness Team (US-CERT ), Washington, DC (2011)
Moor, J.H.: Towards a theory of privacy for the information age. SIGCAS Comput. Soc. 40(2), 31–34 (2010)
Moustafa, W., Deshpande, A., Namata, G., Getoor, L.: Declarative analysis of noisy information networks. In: Proceedings of the IEEE 27th International Conference on Department of Computer Science, Data Engineering Workshops (ICDEW), Hannover, pp. 106–111, (2011)
MySpace: http://www.myspace.com
Netcraft: http://news.netcraft.com (2009)
Paraskevas, A., Arendell, B.: A strategic framework for terrorism prevention and mitigation in tourism destinations. Tour. Manage. 28(6), 1560–1573 (2007)
PhishingTank: What is phishing? (cited 6/12/11). Available from: http://www.phishtank.com/what-is-phishing.php
PricewaterhouseCoopers: Security for social networking. Available on: http://www.pwc.com/en_US/us/it-risk-security/assets/security-social-networking.pdf, (2010)
Reid, E.F., Chen, H.: Mapping the contemporary terrorism research domain. Int. J. Hum. Comput. Stud. 65(1), 42–56 (2007)
Sancho, D.: Security guide to social networks, A Trend Micro White Paper, Aug, (2009).
schrock, A.: Examining social media usage: technology clusters and social network relationships. First Monday 14(1), (2009)
Shani, G., Chickering, M., Meek, C.: Mining recommendations from the web. In: Proceedings of the 2008 ACM Conference on Recommender System, Lausanne, pp. 35–42 (2008)
Sheldon, P.: The relationship between unwillingness to communicate and students Facebook use. J Media Psychol. Theor. Method Appl. 20(2), 67–75 (2008)
Skyrock: http://www.Skyrock.com. Accessed on 2012
Snasel, V., Horak, Z., Abraham, A.: Link suggestions in terrorists networks using semi discrete decomposition. In: Sixth International Conference on Information Assurance and Security (IAS), USA, IEEE, ISBN 978-1-4244-7408-0, pp. 337–339 (2010)
Soghoian, C.: Hackers target facebook apps. CNet News, (cited 5/12/11). Available from: http://news.cnet.com/8301-13739-3-9904331-46.html (2008)
Solanas, A.: Privacy protection with genetic algorithms. Stud. Computat. Intel. 92, 215–237 (2008)
Tantipathananandh, C., Breger-wolf, T., Kempe, D.: A framework for community identification in dynamic Social network. In: Proceedings of the KDD 2007, San Jose, CA, USA, pp. 717–726 (2007)
Thellwal, M.: Social networks, gender and friending, analysis of myspace profiles. J. Am. Soc. Inf. Sci. Technol. 591(8), 1321–1330 (2008)
Tufekci, Z.: Grroming, gossip facebook and myspace: what can we learn about these sites from those who wont assimilate? Inf. Commun. Soc. 11(4), 544–564 (2008)
http://www.facebook.com/note.php?note_id=324110600939875. Accessed on 2012
http://en.wikipedia.org/wiki/Betweenness. Accessed on 2012
http://www.facebook.com. Accessed on 2012
Walther, J., Vander Heide, B., Kim, S., Westerman, D., Tang, S.T.: The role of friends appearance and behaviour on evaluations of individuals on facebook: are we known by the company we keep? Hum. commun. Res. 34, 28–49 (2008)
Wolf, Y., Frankel, O.: Terrorism: toward an overarched account and prevention with a special reference to pendulum interplay between both parties. Aggress. Viol. Behav. 12(3), 259–279 (2007)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: SybilGuard: defending against sybil attacks via social networks. SIGCOMM’06 16(3), 576–589 (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag London
About this chapter
Cite this chapter
Salama, M., Panda, M., Elbarawy, Y., Hassanien, A.E., Abraham, A. (2012). Computational Social Networks: Security and Privacy. In: Abraham, A. (eds) Computational Social Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4051-1_1
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4051-1_1
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4050-4
Online ISBN: 978-1-4471-4051-1
eBook Packages: Computer ScienceComputer Science (R0)