IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security and Management in Social Network

Information Security and Management in Social Network
View Sample PDF
Author(s): Alkesh Patel (Rediff.com, India)and Ajit Balakrishnan (Rediff.com, India)
Copyright: 2012
Pages: 20
Source title: Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
Source Author(s)/Editor(s): Manish Gupta (State University of New York at Buffalo, USA), John Walp (M&T Bank Corporation, USA)and Raj Sharman (State University of New York, USA)
DOI: 10.4018/978-1-4666-0197-0.ch007

Purchase

View Information Security and Management in Social Network on the publisher's website for pricing and purchasing information.

Abstract

Social networking sites (SNSs) have gained significant attention in last few years. Most Internet users are associated with at least one popular SNS depending on their personal and professional preferences. Users have, in general, trusted the SNSs with personal data, and assumed that their privacy preferences are correctly enforced. Users of SNSs often want to manage the sharing of information and content with different groups of people based on their differing relationships. Configuring settings for each user is a great burden for a user, and most of the time, settings are not evident to users, and hence some automatic or semi-automatic mechanism should be available to reduce the privacy configuration efforts. Increasing user-driven contribution has also led to other kinds of problems, like spam and abusive message contents. The authors refer both of these types as social spam, which not only consumes extra resources of site, but also spoils the user experience and creates legal issues. In large scale SNS, human moderation becomes out of hand, and there is a need for machine intelligence to get rid of such spammers in an effective way. In social networks, users’ actions, contributions, demographic details, et cetera can be tracked, and necessary measures can be taken if unwanted behavior about a particular user is detected. One can make a user model of reputation to identify troublesome users and ban their activities temporarily or permanently whenever needed. User reputation systems help to improve the user experience of a site, enrich content quality, and provide incentives for users to become better, more active participants. In this chapter, authors describe issues related to privacy, social spamming, and show the measures to handle them by nearly automatic ways. The chapter also shows the making of a user reputation system and its applicability in social network.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom