2014
DOI: 10.1504/ijcse.2014.060717
|View full text |Cite
|
Sign up to set email alerts
|

A taxonomy-based model of security and privacy in online social networks

Abstract: Social environments were already present in the original web vision, but nowadays are mainly available through online social networks (OSNs), which are a real cultural phenomenon. However, their actual deployment is very heterogeneous, reflecting into different development choices and functional architectures. Such aspects, jointly with the intrinsic sharing of personal information, lead to severe risks both in terms of security and privacy. In this perspective, our work proposes a taxonomy-based approach to d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 37 publications
0
9
0
Order By: Relevance
“…It is imperative to recognize social engineering attempts in their early stages with a proactive security and contingency plan. From a management perspective, multifactor authentication security policies strengthen defense mechanisms for the firm [40][41][42]. A defense mechanism against social engineering attacks is comprised of detection systems in various devices, adjustment of browser settings, and usage of anti-spyware in the network [43].…”
Section: Defense Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is imperative to recognize social engineering attempts in their early stages with a proactive security and contingency plan. From a management perspective, multifactor authentication security policies strengthen defense mechanisms for the firm [40][41][42]. A defense mechanism against social engineering attacks is comprised of detection systems in various devices, adjustment of browser settings, and usage of anti-spyware in the network [43].…”
Section: Defense Mechanismsmentioning
confidence: 99%
“…Social engineering attacks in the form of malware that links to the operating system also have the ability to impact the performance of the devices, as in the case of battery draining attacks. Furthermore, attackers through gaming applications on mobile devices also have the capability to conduct traffic flooding attacks in the form of messages and pings or even crashing the system to prevent legitimate users from conducting their work [41].…”
Section: Mobilementioning
confidence: 99%
“…The main purpose of this web application is mining contents of the most popular SNSs (e.g., Facebook and Twitter, also exploiting their known privacy flaws [22], [23]) investigating possible threatening messages, in order to recognize the profile of a bully and report it to the community. This concept is already implemented in the popular application ReThink, which keeps trace of outgoing messages.…”
Section: B Sbulloniamocimentioning
confidence: 99%
“…Online Social Networks (OSNs) enable users to have more freedom and proximity in keeping in touch with their friends and in expanding their social contacts. However, they also create serious privacy concerns given the personal nature of information users share over them on almost a daily basis [7] [3]. Users publish their personal stories and updates, as they might also express their opinion by interacting on information shared by others, but, in most cases, they are not fully aware of the size of the audience that gets access to their information.…”
Section: Introductionmentioning
confidence: 99%