Security and privacy engineering for corporate use of social community platforms

نویسنده

  • Lothar Fritsch
چکیده

Social media (SM) platforms are being used for many purposes. As they were successful in accumulating a large number of well-networked user communities over the recent years, those platforms and their communities became interesting for corporate and commercial use, visible in a wave of books on businesses and SM. However, the “corporate user” normally is composed of many individual users that implement a subset of corporate functions, and has other security needs as those of private consumers. This article reviews corporate use cases for SM, and presents an overview of information security and information privacy requirements following from these uses. The article concludes with a comment on today’s SM platforms capabilities to support these requirements. 1 Corporate use of social communities Social communities are computer platforms that allow their users to represent themselves in profiles to establish social relationships to other users, and to supply and share media objects with subsets of their network [1, 2]. Such sharing produces many problems related to user’s roles and user’s access and object use permissions that should be aligned with the collaboration workflows intended by the users. Roles and permissions for individual users are defined in a single place, where the object access permissions and personal relationships (from here on called “policy”) are defined. SM have grown to become popular private interaction platforms for multimedia [3]. However, policy management is different for corporate users. A corporate user is here defined as: A corporate user of SM is an organization based on workflows using communication and collaboration in SM as part of their organizational strategy. Complementing this definition, these assumptions on corporate users are made: Other, more seasoned communication channels, such as telephony, e-mail, paper messages, video conferencing, web portals and personal meetings are used as well to implement corporate strategy. Next, there are information objects and interactions that are restricted to the public, e.g. business secrets, patent applications, customer data records, price lists and contract conditions to particular customers. For many of the restricted objects above, the corporate user has developed rules and processes. These involve both the definition of access restrictions on objects, and the definition of workflows and processes for the handling of typical business actions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...

متن کامل

A Sudy on Information Privacy Issue on Social Networks

In the recent years, social networks (SN) are now employed for communication and networking, socializing, marketing, as well as one’s daily life. Billions of people in the world are connected though various SN platforms and applications, which results in generating massive amount of data online. This includes personal data or Personally Identifiable Information (PII). While more and more data a...

متن کامل

Analysis and Evaluation of Privacy Protection Behavior and Information Disclosure Concerns in Online Social Networks

Online Social Networks (OSN) becomes the largest infrastructure for social interactions like: making relationship, sharing personal experiences and service delivery. Nowadays social networks have been widely welcomed by people. Most of the researches about managing privacy protection within social networks sites (SNS), observes users as owner of their information. However, individuals cannot co...

متن کامل

An Effective Method for Utility Preserving Social Network Graph Anonymization Based on Mathematical Modeling

In recent years, privacy concerns about social network graph data publishing has increased due to the widespread use of such data for research purposes. This paper addresses the problem of identity disclosure risk of a node assuming that the adversary identifies one of its immediate neighbors in the published data. The related anonymity level of a graph is formulated and a mathematical model is...

متن کامل

Accessibility Evaluation in Biometric Hybrid Architecture for Protecting Social Networks Using Colored Petri Nets

In the last few decades, technological progress has been made important information systems that require high security, Use safe and efficient methods for protecting their privacy. It is a major challenge to Protecting vital data and the ability to threaten attackers. And this has made it important and necessary to be sensitive to the authentication and identify of individuals in confidential n...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011