IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Graph-Based Approach to Model Privacy and Security Issues of Online Social Networks

A Graph-Based Approach to Model Privacy and Security Issues of Online Social Networks
View Sample PDF
Author(s): Luca Caviglione (National Research Council of Italy, Italy), Mauro Coccoli (University of Genoa, Italy)and Alessio Merlo (University of Genoa, Italy & Università Telematica E-Campus, Italy)
Copyright: 2013
Pages: 22
Source title: Social Network Engineering for Secure Web Data and Services
Source Author(s)/Editor(s): Luca Caviglione (Institute of Intelligent Systems for Automation (ISSIA), Italy), Mauro Coccoli (University of Genoa, Italy)and Alessio Merlo (University of Genoa & Università Telematica e-campus, Italy)
DOI: 10.4018/978-1-4666-3926-3.ch009

Purchase

View A Graph-Based Approach to Model Privacy and Security Issues of Online Social Networks on the publisher's website for pricing and purchasing information.

Abstract

With millions of users, Online Social Networks (OSNs) are a huge cultural phenomenon. Put briefly, they are characterized by: i) an intrinsic sharing of personal information, ii) a rich set of features to publish, organize and retrieve contents, especially for emphasizing their social organization, iii) the interaction with a heterogeneous set of devices, e.g., ranging from desktops to mobile appliances, and iv) the mix of Web-based paradigms and sophisticated methodologies for processing data. However, if not properly implemented, or without effective security policies, i) – iv) could lead to severe risks in terms both of privacy and security. In this perspective, this chapter analyzes the major peculiarities of OSN platforms, the preferred development methodologies, and usage patterns, also by taking into account how personal information can be exploited to conduct malicious actions. Then, a graph-based modeling approach is introduced to reveal possible attacks, as well as to elaborate the needed countermeasures or (automated) checking procedures.

Related Content

Nitesh Behare, Rashmi D. Mahajan, Meenakshi Singh, Vishwanathan Iyer, Ushmita Gupta, Pritesh P. Somani. © 2024. 36 pages.
Shikha Mittal. © 2024. 21 pages.
Albérico Travassos Rosário. © 2024. 31 pages.
Carla Sofia Ribeiro Murteira, Ana Cristina Antunes. © 2024. 23 pages.
Mario Sierra Martin, Alvaro Díaz Casquero, Marina Sánchez Pérez, Bárbara Rando Rodríguez. © 2024. 17 pages.
Poornima Nair, Sunita Kumar. © 2024. 18 pages.
Neli Maria Mengalli, Antonio Aparecido Carvalho. © 2024. 16 pages.
Body Bottom