Article Outline
Glossary
Definition of the Subject
Introduction
Background on Social Networking Communities
Traditional Attacks Targeting Social Networking Communities
New Attacks Against Social Networking Communities
Future Directions
Bibliography
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- Social networking community :
-
A community of individuals (users) that are connected based on mutually shared activities, beliefs, goals, or relationships.
- Profile :
-
A user‐controlled web page that contains a picture of a community user along with various pieces of personal information for that user.This is often the online representation of an individual in a social networking community.
- Friend request:
-
A communication mechanism that allows community users to initiate connections between their profiles and the profiles of their friends.
Bibliography
Associated Press (2006) Official Sues Students Over MySpace Page.http://www.sfgate.com/cgi-bin/article.cgi?file=/news/archive/2006/09/22/national/a092749D95.DTL
Boyd C (2006) Teenagers used to push Zango on Myspace.http://www.vitalsecurity.org/2006/07/teenagers-used-to-push-zango-on.html
Freiert M (2008) February Top Social Networks - Make way for the new guys.http://blog.compete.com/2008/03/07/top-social-networks-traffic-feb-2008
Geer D (2005) Malicious bots threaten network security. IEEE Computer38(1):18–20
Google Press Center (2006) Google To Acquire YouTube for $1.65 Billion in Stock.http://www.google.com/press/pressrel/google_youtube.html
Hitwise (2008) Hitwise US - Top 20 Websites - February, 2008.http://www.hitwise.com/datacenter/rankings.php
Jagatic T et al (2007) Social Phishing. Communications of the ACM50(10):94–100
King R (2006) Marketing to Kids Where They Live.http://www.businessweek.com/technology/content/sep2006/tc20060908_974400.htm?campaign_id=bier_tcs.g3a.091106a
Krebs B (2006) Hacked Ad Seen on MySpace Served Spyware to a Million.http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html
Ross B et al (2005) Stronger password authentication using browserextensions. In: Proceedings of the 14th Usenix SecuritySymposium, Baltimore, 31 Jul – 5 Aug 2005, pp 17–32
Samy (2005) Technical explanation of the MySpace worm.http://namb.la/popular/tech.html
Sanchez M (2006) Pranksters posting fake profiles on MySpace.http://www.dfw.com/mld/dfw/news/local/15255785.htm?template=contentModules/printstory.jsp
Seibel J (2006) Boy charged in creating fake Myspace profile.http://www.jsonline.com/story/index.aspx?id=413620
Swartz J (2008) Social‐networking sites going global.http://www.usatoday.com/money/industries/technology/2008-02-10-social-networking-global_N.htm
Technocrat (2006) Myspace Phishing Attacks on the Rise.http://djtechnocrat.blogspot.com/2006/05/myspace-phishing-attacks-on-rise.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag
About this entry
Cite this entry
Webb, S., Caverlee, J., Pu, C. (2012). Granular Computing System Vulnerabilities: Exploring the Dark Side of Social Networking Communities. In: Meyers, R. (eds) Computational Complexity. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1800-9_91
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1800-9_91
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1799-6
Online ISBN: 978-1-4614-1800-9
eBook Packages: Computer ScienceReference Module Computer Science and Engineering