منابع مشابه
Threats of Online Social Networks
In the recent years, we have witnessed a dramatic rise in popularity of online social networking services, with several Social Network Sites (SNSs) such as Myspace, Facebook, Blogger, You Tube, Yahoo! Groups etc are now among the most visited websites globally. However, since such forums are relatively easy to access and the users are often not aware of the size and the nature of the audience a...
متن کاملOnline Social Networks: Privacy Threats and Defenses
With over 1 billion users connected through online social networks, user privacy is becoming ever more important and is widely discussed in the media and researched in academia. In this chapter we provide a brief overview of some threats to users’ privacy. We classify these threats as: users’ limitations, design flaws and limitations, implicit flows of information, and clash of incentives. We a...
متن کاملProfile Matching Across Unstructured Online Social Networks: Threats and Countermeasures
In this work, we propose a profile matching (or deanonymization) attack for unstructured online social networks (OSNs) in which similarity in graphical structure cannot be used for profile matching. We consider different attributes that are publicly shared by users. Such attributes include both obvious identifiers such as the user name and non-obvious identifiers such as interest similarity or ...
متن کاملInformation Processes and Threats in Social Networks . A
The paper presents a conceptual model based case study of information processes and threats of the most fast progressing social network in Internet for 2010 – Facebook. The key idea is to study the Web.2 technology feedback effects in social networks by using E-R system notation and software environment for modelling and simulation support. The obtained results are based on high-level subject m...
متن کاملSocial Threats Modelling with i*
Security incidents lead to loss or disruptions of an organisation’s operations, services or functions, or reductions in the quality of the expected services. For any security incident, there is an individual or a group of attackers, conducting the attack action, towards one or many victims. The two sides are played by social actors, with certain social positions, protecting or obstructing a giv...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Kultura
سال: 2013
ISSN: 0023-5164
DOI: 10.5937/kultura1339028m