Academic literature on the topic 'Online social network security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online social network security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Online social network security measures"

1

Salahdine, Fatima, and Naima Kaabouch. "Social Engineering Attacks: A Survey." Future Internet 11, no. 4 (2019): 89. http://dx.doi.org/10.3390/fi11040089.

Full text
Abstract:
The advancements in digital communication technology have made communication between humans more accessible and instant. However, personal and sensitive information may be available online through social networks and online services that lack the security measures to protect this information. Communication systems are vulnerable and can easily be penetrated by malicious users through social engineering attacks. These attacks aim at tricking individuals or enterprises into accomplishing actions that benefit attackers or providing them with sensitive data such as social security number, health records, and passwords. Social engineering is one of the biggest challenges facing network security because it exploits the natural human tendency to trust. This paper provides an in-depth survey about the social engineering attacks, their classifications, detection strategies, and prevention procedures.
APA, Harvard, Vancouver, ISO, and other styles
2

Ikhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Full text
Abstract:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself. Findings Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs. Research limitations/implications The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions. Practical implications SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos. Social implications The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness. Originality/value Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information Attacks on Online Social Networks." Journal of Information Technology Research 7, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/jitr.2014070104.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Bo, Qiang Li, Yuede Ji, Dong Guo, and Xiangyu Meng. "Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users." Security and Communication Networks 2019 (July 11, 2019): 1–14. http://dx.doi.org/10.1155/2019/3053418.

Full text
Abstract:
Online social networks have become an essential part of our daily life. While we are enjoying the benefits from the social networks, we are inevitably exposed to the security threats, especially the serious Advanced Persistent Threat (APT) attack. The attackers can launch targeted cyberattacks on a user by analyzing its personal information and social behaviors. Due to the wide variety of social engineering techniques and undetectable zero-day exploits being used by attackers, the detection techniques of intrusion are increasingly difficult. Motivated by the fact that the attackers usually penetrate the social network to either propagate malwares or collect sensitive information, we propose a method to assess the security risk of the user being attacked so that we can take defensive measures such as security education, training, and awareness before users are attacked. In this paper, we propose a novel user analysis model to find potential victims by analyzing a large number of users’ personal information and social behaviors in social networks. For each user, we extract three kinds of features, i.e., statistical features, social-graph features, and semantic features. These features will become the input of our user analysis model, and the security risk score will be calculated. The users with high security risk score will be alarmed so that the risk of being attacked can be reduced. We have implemented an effective user analysis model and evaluated it on a real-world dataset collected from a social network, namely, Sina Weibo (Weibo). The results show that our model can effectively assess the risk of users’ activities in social networks with a high area under the ROC curve of 0.9607.
APA, Harvard, Vancouver, ISO, and other styles
5

Franchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Information and Password Attacks on Social Networks." Journal of Information Technology Research 8, no. 1 (2015): 25–42. http://dx.doi.org/10.4018/jitr.2015010103.

Full text
Abstract:
Online social networks have changed the way people interact, allowing them to stay in touch with their acquaintances, reconnect with old friends, and establish new relationships with other people based on hobbies, interests, and friendship circles. Unfortunately, the regrettable concurrence of the users' carefree attitude in sharing information, the often sub-par security measures from the part of the system operators and, eventually, the high value of the published information make online social networks an interesting target for crackers and scammers alike. The information contained can be used to trigger attacks to even more sensible targets and the ultimate goal of sociability shared by the users allows sophisticated forms of social engineering inside the system. This work reviews some typical social attacks that are conducted on social networking systems, carrying real-world examples of such violations and analysing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.
APA, Harvard, Vancouver, ISO, and other styles
6

He, Jianmin, Dongming Tian, and Yezheng Liu. "The Measure Method of Complaint Theme Influence in View of Netizens’ Emotional Resonance." Journal of Systems Science and Information 5, no. 4 (2017): 310–27. http://dx.doi.org/10.21078/jssi-2017-310-18.

Full text
Abstract:
AbstractOn the social network platform, complaints about the public policy formulation and implementation issues arise largely. Through the information aggregation, frequent interaction, word-of-mouth and emotional resonance on online social network, these information will lead to the outbreak of the network complaints. It brings difficulties and challenges in public management. China is under a period of social transformation, and there are various problems and contradictions. Emergency can easily arouse group complaints on online network, and it will lead to network public opinion through inducing social emotional resonance, which is harmful to social security and stability. This paper has built the evaluation index system from four dimensions with complaint text’s quality, transmission timeliness, user interaction degree and emotional resonance excited by emergency. Then, we establish the dynamic influence measure model of online netizens complaint theme based on an entropy weight model. The measure model is proved to be reasonable and effective by the empirical research of Sina Weibo data. The model can effectively solve the measure problem of group complaints influence when the emergencies arouse social emotional resonance. It has important theoretical significance and practical value for public policy decision-maker on listening to online group complaints, understanding public opinion, and making public policy.
APA, Harvard, Vancouver, ISO, and other styles
7

Shields, Thomas, Hannah Li, Peter Lebedev, and Josiah Dykstra. "Cyber Buzz: Examining Virality Characteristics of Cybersecurity Content In Social Networks." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 441–45. http://dx.doi.org/10.1177/1071181320641099.

Full text
Abstract:
The Internet is a rich environment for information to spread rapidly and widely. The ability of cybersecurity content to achieve virality in social networks can be useful for measuring security awareness, policy adoption, or cybersecurity literacy. It may also reveal new and emerging cybersecurity events. Virality in online social networks can be characterized and measured many ways and have different causes. Leveraging existing research in social network virality measurements, we calculate and analyze virality measurements and correlations on an anonymized Reddit dataset, examining overall trends and characteristics of individual cybersecurity forums (subreddits). We reproduce content-based virality prediction algorithms and assess their performance, then introduce additional features beyond post title, including time of day, to improve prediction accuracy to ~71% for each of the virality scores. We examine the intersection of the virality facets to reveal correlations about the content and times when cybersecurity content is most viral.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhou, Fan, Kunpeng Zhang, Shuying Xie, and Xucheng Luo. "Learning to Correlate Accounts Across Online Social Networks: An Embedding-Based Approach." INFORMS Journal on Computing 32, no. 3 (2020): 714–29. http://dx.doi.org/10.1287/ijoc.2019.0911.

Full text
Abstract:
Cross-site account correlation correlates users who have multiple accounts but the same identity across online social networks (OSNs). Being able to identify cross-site users is important for a variety of applications in social networks, security, and electronic commerce, such as social link prediction and cross-domain recommendation. Because of either heterogeneous characteristics of platforms or some unobserved but intrinsic individual factors, the same individuals are likely to behave differently across OSNs, which accordingly causes many challenges for correlating accounts. Traditionally, account correlation is measured by analyzing user-generated content, such as writing style, rules of naming user accounts, or some existing metadata (e.g., account profile, account historical activities). Accounts can be correlated by de-anonymizing user behaviors, which is sometimes infeasible since such data are not often available. In this work, we propose a method, called ACCount eMbedding (ACCM), to go beyond text data and leverage semantics of network structures, a possibility that has not been well explored so far. ACCM aims to correlate accounts with high accuracy by exploiting the semantic information among accounts through random walks. It models and understands latent representations of accounts using an embedding framework similar to sequences of words in natural language models. It also learns a transformation matrix to project node representations into a common dimensional space for comparison. With evaluations on both real-world and synthetic data sets, we empirically demonstrate that ACCM provides performance improvement compared with several state-of-the-art baselines in correlating user accounts between OSNs.
APA, Harvard, Vancouver, ISO, and other styles
9

Adogame, Afe. "The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse." Asian Journal of Social Science 37, no. 4 (2009): 551–73. http://dx.doi.org/10.1163/156853109x460192.

Full text
Abstract:
AbstractOne issue that has launched Nigeria into international réclame and public ignominy, especially in the last decade, is the Advance Fee Fraud (a.k.a. '419'), a code which refers originally to the section of the Nigerian Penal Law that deals with specific fraud schemes. The paper located the economic and socio-political upheavals in Nigeria from the late 1970s as the leverage for the advent and consolidation of fraudulent schemes. It demonstrated how youths have increasingly appropriated the Internet as a gateway to the world and as conduits for information enhancement, economic empowerment or a means to achieving their own ends. Through a careful analysis of 150 documented scam letters, this paper describes the emerging variations of a theme. As a transnational organised crime, this paper demonstrates how its increasing complexity and sophistication, with the target audience of individuals and corporate bodies within the domestic and international frontiers, has attracted local-global security attention and action. The paper concludes that the changing anatomy and the elasticity of the criminal transnational networks can be better grasped, and the preventive measures by individual, government and corporate security agencies prove efficacious, when understood and located within local-global contexts and wider operational frameworks.
APA, Harvard, Vancouver, ISO, and other styles
10

Poncy, George, Mijin Kim, Katherine Ramos, and Frederick G. Lopez. "Career Planning Confidence Among Facebook Users." Journal of Career Assessment 26, no. 4 (2017): 599–615. http://dx.doi.org/10.1177/1069072717723094.

Full text
Abstract:
As a highly popular social networking site (SNS) for exchanging information about their personal activities, values, goals, and accomplishments with their online “friends,” Facebook (FB)© enables social comparisons and identity negotiations that may influence college students’ career planning confidence. However, to date, no studies have examined whether FB use activities and “friend” networks are uniquely associated with such confidence when dispositional variables associated with students’ needs for belongingness and self-presentation are concurrently controlled. In the present study, participants provided information about their FB use activities and networks and completed self-report measures of adult attachment security, authenticity, career decision self-efficacy, and career aspirations. We hypothesized that, controlling for features of FB use, adult attachment security and authenticity would make significant and incremental contributions to our indicators of career confidence and that authenticity would mediate expected relations between attachment security and these outcomes. Our findings yielded general support for these hypotheses. Implications for career counseling practice that considers both clients’ relational dispositions and uses of social media are discussed.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Online social network security measures"

1

Yeratziotis, Alexandros. "A framework to evaluate usable security in online social networking." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012933.

Full text
Abstract:
It is commonly held in the literature that users find security and privacy difficult to comprehend. It is also acknowledged that most end-user applications and websites have built-in security and privacy features. Users are expected to interact with these in order to protect their personal information. However, security is generally a secondary goal for users. Considering the complexity associated with security in combination with the notion that it is not users’ primary task, it makes sense that users tend to ignore their security responsibilities. As a result, they make poor security-related decisions and, consequently, their personal information is at risk. Usable Security is the field that investigates these types of issue, focusing on the design of security and privacy features that are usable. In order to understand and appreciate the complexities that exist in the field of Usable Security, the research fields of Human-Computer Interaction and Information Security should be examined. Accordingly, the Information Security field is concerned with all aspects pertaining to the security and privacy of information, while the field of Human-Computer Interaction is concerned with the design, evaluation and implementation of interactive computing systems for human use. This research delivers a framework to evaluate Usable Security in online social networks. In this study, online social networks that are particular to the health domain were used as a case study and contributed to the development of a framework consisting of three components: a process, a validation tool and a Usable Security heuristic evaluation. There is no existing qualitative process that describes how one would develop and validate a heuristic evaluation. In this regard a heuristic evaluation is a usability inspection method that is used to evaluate the design of an interface for any usability violations in the field of Human-Computer Interaction. Therefore, firstly, a new process and a validation tool were required to be developed. Once this had been achieved, the process could then be followed to develop a new heuristic evaluation that is specific to Usable Security. In order to assess the validity of a new heuristic evaluation a validation tool is used. The development of tools that can improve the design of security and privacy features on end-user applications and websites in terms of their usability is critical, as this will ensure that the intended users experience them as usable and can utilise them effectively. The framework for evaluating Usable Security contributes to this objective in the context of online social networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Irani, Danesh. "Preventing abuse of online communities." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44895.

Full text
Abstract:
Online communities are growing at a phenomenal rate and with the large number of users these communities contain, attackers are drawn to exploit these users. Denial of information (DoI) attacks and information leakage attacks are two popular attacks that target users on online communities. These information based attacks are linked by their opposing views on low-quality information. On the one hand denial of information attacks which primarily use low-quality information (such as spam and phishing) are a nuisance for information consumers. On the other hand information leakage attacks, which use inadvertently leaked information, are less effective when low-quality information is used, and thus leakage of low-quality information is prefered by private information producers. In this dissertation, I introduce techniques for preventing abuse against these attacks in online communities using meta-model classification and information unification approaches, respectively. The meta-model classification approach involves classifying the ``connected payload" associated with the information and using the classification result for the determination. This approach allows for detection of DoI attacks in emerging domains where the amount of information may be constrained. My information unification approach allows for modeling and mitigating information leakage attacks. Unifying information across domains followed by a quantificiation of the information leaked, provides one of the first studies on users' susceptibality to information leakage attacks. Further, the modeling introduced allows me to quantify the reduced threat of information leakage attacks after applying information cloaking.
APA, Harvard, Vancouver, ISO, and other styles
3

Frauenstein, Edwin Donald. "A framework to mitigate phishing threats." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1021208.

Full text
Abstract:
We live today in the information age with users being able to access and share information freely by using both personal computers and their handheld devices. This, in turn, has been made possible by the Internet. However, this poses security risks as attempts are made to use this same environment in order to compromise the confidentiality, integrity and availability of information. Accordingly, there is an urgent need for users and organisations to protect their information resources from agents posing a security threat. Organisations typically spend large amounts of money as well as dedicating resources to improve their technological defences against general security threats. However, the agents posing these threats are adopting social engineering techniques in order to bypass the technical measures which organisations are putting in place. These social engineering techniques are often effective because they target human behaviour, something which the majority of researchers believe is a far easier alternative than hacking information systems. As such, phishing effectively makes use of a combination of social engineering techniques which involve crafty technical emails and website designs which gain the trust of their victims. Within an organisational context, there are a number of areas which phishers exploit. These areas include human factors, organisational aspects and technological controls. Ironically, these same areas serve simultaneously as security measures against phishing attacks. However, each of these three areas mentioned above are characterised by gaps which arise as a result of human involvement. As a result, the current approach to mitigating phishing threats comprises a single-layer defence model only. However, this study proposes a holistic model which integrates each of these three areas by strengthening the human element in each of these areas by means of a security awareness, training and education programme.
APA, Harvard, Vancouver, ISO, and other styles
4

Parris, Iain. "Practical privacy and security for opportunistic networks." Thesis, University of St Andrews, 2014. http://hdl.handle.net/10023/5357.

Full text
Abstract:
When in physical proximity, data can be directly exchanged between the mobile devices people carry - for example over Bluetooth. If people cooperate to store, carry and forward messages on one another's behalf, then an opportunistic network may be formed, independent of any fixed infrastructure. To enable performant routing within opportunistic networks, use of social network information has been proposed for social network routing protocols. But the decentralised and cooperative nature of the networks can however expose users of such protocols to privacy and security threats, which may in turn discourage participation in the network. In this thesis, we examine how to mitigate privacy and security threats in opportunistic networks while maintaining network performance. We first demonstrate that privacy-aware routing protocols are required in order to maintain network performance while respecting users' privacy preferences. We then demonstrate novel social network routing protocols that mitigate specific threats to privacy and security while maintaining network performance.
APA, Harvard, Vancouver, ISO, and other styles
5

Webb, Steve. "Automatic identification and removal of low quality online information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26669.

Full text
Abstract:
Thesis (Ph.D)--Computing, Georgia Institute of Technology, 2009.<br>Committee Chair: Pu, Calton; Committee Member: Ahamad, Mustaque; Committee Member: Feamster, Nick; Committee Member: Liu, Ling; Committee Member: Wu, Shyhtsun Felix. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
6

Gwaka, Leon Tinashe. "Social media risks in large and medium enterprises in the Cape Metropole : the role of internal auditors." Thesis, Cape Peninisula University of Technology, 2015. http://hdl.handle.net/20.500.11838/2086.

Full text
Abstract:
Thesis (MTech (Internal Auditing))--Cape Peninsula University of Technology, 2015.<br>Social media has undoubtedly emerged as one of the greatest developments in this technology driven generation. Despite its existence from years back, social media popularity has recently surged drastically, with billions of users worldwide reported to be on at least one social media platform. This increase in users of social media has further been necessitated by governmental and private-sector initiatives to boost Internet connectivity to bridge the digital divide globally. Mobile Internet access has also fuelled the use of social media as it allows easy and economical connectivity anytime, anywhere. The availability of hundreds of social media platforms has presented businesses with several opportunities to conduct business activities using social media. The use of social media has been reported to avail businesses with plenty of benefits when this use is strategically aligned to business objectives. On the flipside of the coin, these social media platforms have also emerged as new hunting grounds for fraudsters and other information-technology related criminals. As with any invention, engaging social media for business has its own inherent risks; this further complicates existing information-technology risks and also presents businesses with new risks. Despite blossoming into a global phenomenon, social media has no universally accepted frameworks or approaches (thus no safeguards) when engaging with it, resulting in almost unlimited risk exposures. The uncertainly, i.e. risks surrounding social media platforms, proves problematic in determining the optimum social media platform to use in business. Furthermore, organisations are facing challenges in deciding whether to formally adopt it or totally ignore it, with the latter emerging not to be a viable option. The complex nature of social media has made it difficult for enterprises to place a monetary value and determine a return on investment on these platforms. From a governance perspective, it remains a challenge for most enterprises to identify and appoint individuals responsible for social media management within businesses, although recently social media strategist positions have been surfacing. Due to their nature, the social media trigger matters relating to governance, risk and compliance, which imply that internal auditors therefore are expected to champion the adoption of social media in enterprises. As a relatively new concept, the role that internal auditors should play towards social media appears not to be well defined. Through examination of existing guidelines, an attempt is made to define the role of internal auditors towards social media.
APA, Harvard, Vancouver, ISO, and other styles
7

Irwin, Michael Padric. "An investigation of online threat awareness and behaviour patterns amongst secondary school learners." Thesis, Rhodes University, 2013. http://hdl.handle.net/10962/d1002965.

Full text
Abstract:
The research area of this work is online threat awareness within an information security context. The research was carried out on secondary school learners at boarding schools in Grahamstown. The participating learners were in Grades 8 to 12. The goals of the research included determining the actual levels of awareness, the difference between these and self-perceived levels of the participants, the assessment of risk in terms of online behaviour, and the determination of any gender differences in the answers provided by the respondents. A review of relevant literature and similar studies was carried out, and data was collected from the participating schools via an online questionnaire. This data was analysed and discussed within the frameworks of awareness of threats, online privacy social media, sexting, cyberbullying and password habits. The concepts of information security and online privacy are present throughout these discussion chapters, providing the themes for linking the discussion points together. The results of this research show that the respondents have a high level of risk. This is due to the gaps identified in actual awareness and perception, as well as the exhibition of online behaviour patterns that are considered high risk. A strong need for the construction and adoption of threat awareness programmes by these and other schools is identified, as are areas of particular need for inclusion in such programmes. Some gender differences are present, but not to the extent that, there is as significant difference between male and female respondents in terms of overall awareness, knowledge and behaviour.
APA, Harvard, Vancouver, ISO, and other styles
8

Ikhalia, Ehinome. "A malware threat avoidance model for online social network users." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16039.

Full text
Abstract:
The main purpose of this thesis is to develop a malware threat avoidance model for users of online social networks (OSNs). To understand the research domain, a comprehensive and systematic literature review was conducted and then the research scope was established. Two design science iterations were carried out to achieve the research aim reported in this thesis. In the first iteration, the research extended the Technology Threat Avoidance Theory (TTAT) to include a unique characteristic of OSN - Mass Interpersonal Persuasion (MIP). The extended model (TTAT-MIP), focused on investigating the factors that needs to be considered in a security awareness system to motivate OSN users to avoid malware threats. Using a quantitative approach, the results of the first iteration suggests perceived severity, perceived threat, safeguard effectiveness, safeguard cost, self-efficacy and mass interpersonal persuasion should be included in a security awareness system to motivate OSN users to avoid malware threats. The second iteration was conducted to further validate TTAT-MIP through a Facebook video animation security awareness system (referred in this thesis as Social Network Criminal (SNC)). SNC is a Web-based application integrated within Facebook to provide security awareness to OSN users. To evaluate TTAT-MIP through SNC, three research techniques were adopted: lab experiments, usability study and semi-structured interviews. The results suggest that participants perceived SNC as a useful tool for malware threat avoidance. In addition, SNC had a significant effect on the malware threat avoidance capabilities of the study participants. Moreover, the thematic analysis of the semi-structured interviews demonstrated that the study participants' found SNC to be highly informative; persuasive; interpersonally persuasive; easy to use; relatable; fun to use; engaging; and easy to understand. These findings were strongly related to the constructs of TTAT-MIP. The research contributes to theory by demonstrating a novel approach to design and deploy security awareness systems in a social context. This was achieved by including users' behavioural characteristic on the online platform where malware threats occur within a security awareness system. Besides, this research shows how practitioners keen on developing systems to improve security behaviours could adopt the TTAT-MIP model for other related contexts.
APA, Harvard, Vancouver, ISO, and other styles
9

Rahman, Mahmudur. "Data Verifications for Online Social Networks." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2299.

Full text
Abstract:
Social networks are popular platforms that simplify user interaction and encourage collaboration. They collect large amounts of media from their users, often reported from mobile devices. The value and impact of social media makes it however an attractive attack target. In this thesis, we focus on the following social media vulnerabilities. First, review centered social networks such as Yelp and Google Play have been shown to be the targets of significant search rank and malware proliferation attacks. Detecting fraudulent behaviors is thus paramount to prevent not only public opinion bias, but also to curb the distribution of malware. Second, the increasing use of mobile visual data in news networks, authentication and banking applications, raises questions of its integrity and credibility. Third, through proof-of- concept implementations, we show that data reported from wearable personal trackers is vulnerable to a wide range of security and privacy attacks, while off-the-shelves security solutions do not port gracefully to the constraints introduced by trackers. In this thesis we propose novel solutions to address these problems. First, we introduce Marco, a system that leverages the wealth of spatial, temporal and network information gleaned from Yelp, to detect venues whose ratings are impacted by fraudulent reviews. Second, we propose FairPlay, a system that correlates review activities, linguistic and behavioral signals gleaned from longitudinal app data, to identify not only search rank fraud but also malware in Google Play, the most popular Android app market. Third, we describe Movee, a motion sensor based video liveness verification system, that analyzes the consistency between the motion inferred from the simultaneously and independently captured camera and inertial sensor streams. Finally, we devise SensCrypt, an efficient and secure data storage and communication protocol for affordable and lightweight personal trackers. We provide the correctness and efficacy of our solutions through a detailed theoretic and experimental analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Dua, Akshay. "Trust-but-Verify: Guaranteeing the Integrity of User-generated Content in Online Applications." PDXScholar, 2013. https://pdxscholar.library.pdx.edu/open_access_etds/1425.

Full text
Abstract:
Online applications that are open to participation lack reliable methods to establish the integrity of user-generated information. Users may unknowingly own compromised devices, or intentionally publish forged information. In these scenarios, applications need some way to determine the "correctness" of autonomously generated information. Towards that end, this thesis presents a "trust-but-verify" approach that enables open online applications to independently verify the information generated by each participant. In addition to enabling independent verification, our framework allows an application to verify less information from more trustworthy users and verify more information from less trustworthy ones. Thus, an application can trade-off performance for more integrity, or vice versa. We apply the trust-but-verify approach to three different classes of online applications and show how it can enable 1) high-integrity, privacy-preserving, crowd-sourced sensing 2) non-intrusive cheat detection in online games, and 3) effective spam prevention in online messaging applications.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Online social network security measures"

1

Caviglione, Luca, Mauro Coccoli, and Alessio Merlo. Social network engineering for secure web data and services. Information Science Reference, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Perez, Richard, 1969 Oct. 17- and Ely Adam, eds. Seven deadliest social network attacks. Syngress, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Securing the borderless network: Security for the web 2.0 world. Cisco Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Online privacy and social media. ReferencePoint Press, Inc., 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Linde, Barbara M. Safe social networking. Gareth Stevens Pub., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Analyzing and securing social networks. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Privacy online: Perspectives on privacy and self-disclosure in the social web. Springer-Verlag, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abraham, Ajith. Computational Social Networks: Security and Privacy. Springer London, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Safe social networking. Capstone Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

author, Kessinger Bob, Sancin John G. author, and Rose Barb author, eds. Surfing among the cyber sharks: Parent's guide to protecting children and teens from online risk. Prioratus Press, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Online social network security measures"

1

Erdin, Esra, Eric Klukovich, Gurhan Gunduz, and Mehmet Hadi Gunes. "POSN: A Personal Online Social Network." In ICT Systems Security and Privacy Protection. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18467-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pérez-Solà, Cristina, and Jordi Herrera-Joancomartí. "Classifying Online Social Network Users through the Social Graph." In Foundations and Practice of Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37119-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cutillo, Leucio Antonio, Mark Manulis, and Thorsten Strufe. "Security and Privacy in Online Social Networks." In Handbook of Social Network Technologies and Applications. Springer US, 2010. http://dx.doi.org/10.1007/978-1-4419-7142-5_23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Yan, Yingjiu Li, Qiang Yan, and Robert H. Deng. "Think Twice before You Share: Analyzing Privacy Leakage under Privacy Control in Online Social Networks." In Network and System Security. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38631-2_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bennett, Phillipa, Indrakshi Ray, and Robert France. "Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework." In Information Systems Security. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-26961-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Waheed, Amtul, Jana Shafi, and P. Venkata Krishna. "Classifying Content Quality and Interaction Quality on Online Social Networks." In Social Network Forensics, Cyber Security, and Machine Learning. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1456-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Texts in Computer Science. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-70712-9_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Texts in Computer Science. Springer London, 2013. http://dx.doi.org/10.1007/978-1-4471-4990-3_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Undergraduate Topics in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-03937-0_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kizza, Joseph Migga. "Ethical, Privacy, and Security Issues in the Online Social Network Ecosystems." In Ethics in Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-29106-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Online social network security measures"

1

Krajíčková, Aneta. "Změny v managementu kulturního dědictví v důsledku pandemie Covid19." In XXIV. mezinárodního kolokvia o regionálních vědách. Masaryk University Press, 2021. http://dx.doi.org/10.5817/cz.muni.p210-9896-2021-38.

Full text
Abstract:
The Covid19 pandemic has brought a lot of changes to people's lives, and also to the management of individual historical monuments. The aim of this paper is to identify effects of Covid19 pandemic on the daily working of two castles in the South Moravian Region (Lysice State Castle and Rájec nad Svitavou State Castle) and how it affected occupational safety and personnel management, monument security, cultural events, partnerships, marketing, and financial management. Qualitative research is based on interviews with castles’ wardens. The results show that due to the measures and the development of the situation, the pandemic meant above all higher demands on the management of the castles, especially in connection with the organization of cultural events, repairs and staffing. As an important part of management can also be considered the effort to remain in the awareness of the visitors and the associated more intensive use of social networks and a general focus on online tools.
APA, Harvard, Vancouver, ISO, and other styles
2

Bachpalle, Shital D., and Manisha Desai. "Data security approach for online social network." In 2014 2nd International Conference on Current Trends in Engineering and Technology (ICCTET). IEEE, 2014. http://dx.doi.org/10.1109/icctet.2014.6966299.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Research on Security of Online Social Network." In 2017 the 7th International Workshop on Computer Science and Engineering. WCSE, 2017. http://dx.doi.org/10.18178/wcse.2017.06.112.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barbian, Guido. "Detecting Hidden Friendship in Online Social Network." In 2011 European Intelligence and Security Informatics Conference (EISIC). IEEE, 2011. http://dx.doi.org/10.1109/eisic.2011.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jingchi, Jiang, Yi Chengqi, Bao Yuanyuan, and Xue Yibo. "Online Community Perceiving Method on Social Network." In 1st International Workshop on Cloud Computing and Information Security. Atlantis Press, 2013. http://dx.doi.org/10.2991/ccis-13.2013.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Symeonidis, Iraklis, Pagona Tsormpatzoudi, and Bart Preneel. "Collateral Damage of Online Social Network Applications." In 2nd International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2016. http://dx.doi.org/10.5220/0005806705360541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Teo, Hon Jie, Aditya Johri, and Vinod Lohani. "Assessment of online participation through social network measures: A HLM approach." In 2013 IEEE Frontiers in Education Conference (FIE). IEEE, 2013. http://dx.doi.org/10.1109/fie.2013.6685080.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ning, Jianxia, Indrajeet Singh, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Guohong Cao, and Prasant Mohapatra. "Secret message sharing using online social media." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beato, Filipe, Mauro Conti, Bart Preneel, and Dario Vettore. "VirtualFriendship: Hiding interactions on Online Social Networks." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arnaboldi, Valerio, Marco Conti, Andrea Passarella, and Fabio Pezzoni. "Analysis of Ego Network Structure in Online Social Networks." In 2012 International Conference on Privacy, Security, Risk and Trust (PASSAT). IEEE, 2012. http://dx.doi.org/10.1109/socialcom-passat.2012.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Online social network security measures"

1

Balza, Lenin H., Camilo De Los Rios, Alfredo Guerra, Luis Herrera-Prada, and Osmel Manzano. Unraveling the Network of the Extractive Industries. Inter-American Development Bank, 2021. http://dx.doi.org/10.18235/0003191.

Full text
Abstract:
This paper analyzes extractive industries in Colombia and their connections to other economic activities in the country. We use detailed social security data on all formal employees to create an industry-relatedness measure using labor flows between industries. Drawing on the vast network analysis literature, we exploit centrality measures to reveal the importance of the extractive sector among Colombian industries. Our results show that extractive industries are well connected within the Colombian industrial network, and that they are central overall and within their clusters. We also find that extractive industries have stronger linkages with manufacturing and agriculture than with other sectors. Finally, a higher relatedness to extractive activities is correlated with lower levels of employment, specially of female workers.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography