Open Access Open Access  Restricted Access Subscription or Fee Access

Extending Social Privacy Protector for Twitter Social Network

S. Thiraviya, R. Rajam, P Joseph C, Dr.S.Britto R.Kumar

Abstract


Social Networking Services provide an online service platform that focuses and facilitates sharing their interest of day to day events. Today it has been a space for professionals, religious leaders, politicians, students and likeminded groups to propagate and share their views. A recent survey estimated that 85% of internet users use online social network sites such as Twitter, Linkedln and google+ and Facebook. With all their merits and appreciation, social networks face a number of problems such as scalability, reliability, security like spam, phishing and malware, account sent spam and account hijacking or hacking the password. Hence, protecting the social networks is the major concern of the world community and therefore this paper specifically focuses on privacy. The Facebook is depending on default privacy settings and Twitter is in Public setting. Since Twitter is in public setting, providing privacy is essential and it is the need of time. This paper attempts to improve privacy settings in term of restricted uses for twitter Social Network. To substantiate, the questionnaires are prepared and survey has made for the twitter users. The observations and results are discussed.

Keywords


Face Book, Privacy, Profiles, Social Network Analysis, Social Network Security, Twitter.

Full Text:

PDF

References


M..Madden and K. Zickuhr. (2011), Online adults use social networking sites(Online) Available: http://www. pewinternet .org

Facebook-Newsroom, Available : http://www.Facebook.com.

Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “The socialbot network: when bots socialize for fame and money (Published Conference Proceedings style),” in proc. 27th Annu. ACM Conf. Computer Security Applications; 2011, pp. 93–102.

M. Egele, A. Moser, C. Kruegel, and E. Kirda, “Pox: Protecting users from malicious Facebook applications in Pervasive Computing and Communications (Presented Conference Paper style),” presented at the IEEE Conf.2011, pp. 288–294.

Y. Liu, K. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing Facebook privacy settings: User expectations vs. Reality (Published Conference Proceedings style),” in Proc. ACM SIGCOMM conf. Internet Meaurement; 2011, pp.61–70.

G. Stringhini, C. Kruegel, and G. Vigna, “Detecting spammers on social networks(Published Conference Proceedings),” in Proc. 26th Annu. ACM Conf. Computer Security Applications; 2010, pp. 1–9.

S. Nelson, J. Simek, and J. Foltin, The legal implications of social networking(Book style), Regent UL Rev., 2009,vol. 22, pp. 1–481.

Facebook, Available: http://www.sec.gov

J. Kuzma, “Account creation security of social network sites (Book style),” in International Journal of Applied Science and Technology, vol. 1, no. 3, pp. 8–13, 2011.

S. Mahmood and Y. Desmedt, “Poster: preliminary analysis of google+‟s privacy ( Published Conference Proceedings style),” in Proc. 18th Annu. ACM Conf. Computer and Communications Security: 2011, pp809-–812.

D. DeBarr and H. Wechsler, Using social network analysis for spam detection( Book style). Advance in Social Computing,, 2010. pp.62–69.

A. Wang, “Don‟t follow me: Spam detection in twitter in Security and Cryptography(Published Conference Proceedings style),” in Proc. IEEE Conf., 2010, pp. 1–10.

K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: social honeypots+ machine learning Published Conference Proceedings style),” in Proc. 33rd Annu. ACM SIGIR conf. Research and development in information retrieval: 2010, pp.435–442.

M.Fire, G. Katz, and Y. Elovici, Strangers intrusion detection detecting spammers and fake profiles in social networks based on topology anomalies, 2011.

M. Anwar and P. Fong, A visualization tool for evaluating access control policies in social network systems , 2012.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.