Advertisement

Controlling and Mitigating Targeted Socio-Economic Attacks

  • Prabhat KumarEmail author
  • Yashwanth Dasari
  • Shubhangee Nath
  • Akash Sinha
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9844)

Abstract

The transformation of social media has paved a way to express one’s views, ideas, and opinions in an effective and lucid manner which has resulted in its increased popularity. However, there are both pros and cons of this socio-technological revolution. This may lead to its misuse with planned and targeted attacks which often have the potential of massive economic effects. This paper articulates the negative aspects, especially, of how the social media is being misused for greedy needs. Spammers may defame the product to achieve their greedy goal of earning more profit by decreasing the competing effect of their opponents. This paper discusses, analyzes and proposes two novel techniques by which one can either decrease or completely abolish these types of socio-economic attacks.

Keywords

Social media Economic Target attack False content prevention False content tolerance 

References

  1. 1.
  2. 2.
    Pulizzi, J.: B2B Content Marketing: 2014 Benchmarks, Budgets, and Trends—North America (2014). http://contentmarketinginstitute.com/wp-content/uploads/2013/10/B2B_Research_2014_CMI.pdf
  3. 3.
    Cho, Y.C.: Violence and aberration in the age of social media: transforming the advanced communication technology into a better facilitative tool. IEEE Consum. Electron. Mag. 3(4), 69–74 (2014)CrossRefGoogle Scholar
  4. 4.
    Koll, D., Li, J., Stein, J., Fu, X.: On the state of OSN-based Sybil defenses. In: Networking Conference 2014 IFIP, Trondheim, pp. 1–9 (2014)Google Scholar
  5. 5.
  6. 6.
  7. 7.
    Oehri, C., Teufel, S.: Social media security culture. In: Information Security for South Africa, ISSA 2012, Johannesburg, Gauteng, pp. 1–5 (2012)Google Scholar
  8. 8.
    Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., Laplante, P.: Dimensions of cyber-attacks: cultural, social, economic, and political. IEEE Technol. Soc. Mag. 30(1), 28–38 (2011)CrossRefGoogle Scholar
  9. 9.
    Thilagavathi, N., Taarika, R.: Content based filtering in online social network using inference algorithm. In: International Conference on Circuit, Power and Computing Technologies, ICCPCT 2014, Nagercoil, pp. 1416–1420 (2014)Google Scholar
  10. 10.
    Vanetti, M., Binaghi, E., Carminati, B., Carullo, M., Ferrari, E.: Content-based filtering in on-line social networks. In: Dimitrakakis, C. (ed.) PSDML 2010. LNCS, vol. 6549, pp. 127–140. Springer, Heidelberg (2010)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2016

Authors and Affiliations

  • Prabhat Kumar
    • 1
    Email author
  • Yashwanth Dasari
    • 1
  • Shubhangee Nath
    • 1
  • Akash Sinha
    • 1
  1. 1.Department of Computer Science and EngineeringNational Institute of Technology PatnaPatnaIndia

Personalised recommendations