Social Network and Data Security Issues
DOI:
https://doi.org/10.32628/CSEIT228219Keywords:
Social Networking Sites, Cyber Criminals, Cybercrime, Social Network Security, Security Analysis, Security Threats, CBIRAbstract
Computer security is a branch of technology known as Information Security, as it is applied to computers and networks. The objective of computer security involves the protection of information and property from theft and corruption, or natural disasters, while information and property can remain productive and accessible to their intended users. Computer system security terminology means the collective processes and mechanisms through which information, sensitive and valuable services are protected from dissemination, and tampering with or collapsing caused by unauthorized or unreliable activities, and unplanned events, respectively to solve the problems of information security on the social network website. We have to learn about the basic concept and structure of the social network website and its associated social network. The social network of services in the Internet zone usually refers to: social network service, social networking programs and social network website. Clearly, these three things are interlinked and indispensable; they are combined to form a platform for users to communicate information.
References
- Fogel J,Nehmad E.Internet social network communities:Risk taking,trust。and privacy concerns J- J].Computers in Human Behavior,2009,25(1):53.
- Valter F E,Battiston S,Schweitzer F.A model of a trust based recommendation system on a social network[J].AutonomousAgents and Multi-Agent Systems,2008,16(1):57.
- Sun Jian, Zhu Xiaoyan, liu Momeng, etc. Privacy research to social network security [J]. Journal of network security technology and application, 2011, (10) : 76-79.
- Kim Youngae,Phalak Rasik.A trust prediction framework in rating-based experience sharing social networks without a Web of Trust[J].Information Sciences,2012,191(5):128.
- Westerman D,Spence RP,Van Der Heide B.A social network as information:the effect of system generated reports of connectedness on credibility on Twitter[J].Computers in Human Behavior,2012.28:19.
- Wu Huxin, Wu Bo, zhang Ming. Social networks risk's influence on the national information security [J]. Contemporary spread, 2010. (01) : 75-76.
- Michael Lang, Jonathan Devitt, Sean Kelly, Andrew Kinneen, John O’Malley, Darren Prunty”Social Networking and personal Data Security: A Study of Attitudes and Public Awareness in Ireland” 2009 International Conference on Management of e-Commerce and e-Government.
- Barnes, S. (2006). A privacy paradox: Social networking in the United States. First Monday, 11(9). doi:10.5210/fm.v11i9.1394
- Kumar, A., Gupta, S. K., Rai, A. K., & Sinha, S. (2013). Social Networking Sites and Their Security Issues. International Journal of Scientific and Research Publications, 3(4), 3.
- Verma, A., Kshirsagar, D., & Khan, S. (2013). Privacy and Security: Online Social Networking. International Journal of Advanced Computer Research, 3(8), 310-315.
- Deng, X., Bispo, C. B., & Zeng, Y. (2014). A Reference Model for Privacy Protection in Social Networking Service. Journal Of Integrated Design & Process Science, 18(2), 23-44. doi:10.3233/jid-2014-0007
- Bertot, J. C., Jaeger, P. T., & Hansen, D. (2012). The impact of polices on government social media usage: Issues, challenges, and recommendations. Government Information Quarterly, 29(1), 30-40.
- Vladlena, B., Saridakis, G., Tennakoon, H., & Ezingeard, J. N. (2015). The role of security notices and online consumer behaviour: An empirical study of social networking users. International Journal Of Human - Computer Studies, 8036-44. doi:10.1016/j.ijhcs.2015.03.004
- Kim, H. J. (2012). Online Social Media Networking and Assessing Its Security Risks. International Journal Of Security & Its Applications, 6(3), 11-18.
- GUNDECHA, P., BARBIER, G., JILIANG, T., & HUAN, L. (2014). User Vulnerability and Its Reduction on a Social Networking Site. ACM Transactions on Knowledge Discovery From Data, 9(2), 12:1-12:25. doi:10.1145/2630421
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.