Preview

Data Communication and Networks Research Paper

Powerful Essays
Open Document
Open Document
5867 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Communication and Networks Research Paper
PRIVACY ISSUES IN ONLINE SOCIAL NETWORKING: A SURVEY
Rabia Khan, Suriya Gharib, Nargis Munir, Syeda Roshana Ali Naqvi rabia.khan1050@gmail.com, {suriya_rehman, nargismunir198, r.ali_naqvi} @yahoo.com

Abstract
With the advancement in internet technologies a new concept for socialization emerge called
Online Social Networks, that provide the user with facility to interact with people around the globe. This interaction provides many constructive features but some negative aspects also exist. This paper describes the concept of privacy in Online Social Network.
First, various privacy threats are explored and brief description of these threats is provided.
Then, different models, related to the management and detection of privacy issues are explored and a tool for the detection of privacy violation is also discussed.
Keywords:
Online Social Networking (OSN), privacy, threats, Trust evaluation, Data reachability model, PROTOSS, encryption, malware

1. Introduction
Online Social Networking (OSN) has gained a great popularity across the globe. It allows millions of users to produce and consume the data. Online Social Networking has extended the boundaries of communication. Millions of users access different sites at a time and share their personal interests. In the recent years growth of online networks has offered a vast range of opportunities to communicate and share resources and which consequently has raised privacy and security issues. These issues become prominent in areas of managing personal information while communicating with desired contacts. By accessing Online
Social Networks privacy of various users is threaten. Multiple of users provide their

personal information on various sites that may attract the attackers and these malicious users grasp their information which is misused by them later. This personal information is leaked through poor privacy setting. Many on internet do not have accurate control over the privacy.
Even those websites that ensure the



References: (ISIEA2011), Langkawi, Malaysia, September 2011 Networks”, 2011, IEEE [11] Research Sciences and Advanced Engineering Vol.2 (3), ISSN: 2319-6106, 2012 DSRC (ICETCIP '2011) Bangkok Dec., 2011

You May Also Find These Documents Helpful

  • Good Essays

    The factors that contributed to the growth of trade along the Silk Road is that it was located along the threshold of central Asia. All of the traders share customs with the steppe nomads farther to the East (202). The Chinese were eager to buy western products (203) which were another contributing factor for trade to be in one central area, because merchants would flock to that area. Cooperative relations between caravan traders and pastoral nomads in Central Asia grasslands increased. Parthian rulers from Iran were nomadic in origin and helped trade flourish. The spread of products and cultures along the silk road caused the spread of lifestyles and the bringing of people together. It was considered a social system in which different peoples could come together, communicate, and share their natural wealth with the world. The silk trade continued to grow for these reasons. (page 201)…

    • 873 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3120 Network Communications Infrastructure Unit 10 Network Management—FCAPS © ITT Educational Services, Inc. All rights reserved. Learning Objective …

    • 599 Words
    • 9 Pages
    Satisfactory Essays
  • Better Essays

    3. Figure 3 shows screen shot of entire contents of the file properties dialog box.…

    • 664 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Scenario 2: You manage a group of seven employees in a small consulting business. Some employees work at home and some work in the office. Each of the employees needs to be connected to the Internet.…

    • 426 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Annotated Bibliography

    • 943 Words
    • 3 Pages

    Facebook has more than five hundred million users and fifty percent are logged on every day, because of this it makes it a large target for online hackers. Many applications on social networking sites can access a user’s personal information. An increasing number of Facebook users are adding “friends” on their Facebook that they do not know and because they accept the friend request, it is not abuse since the friend request was accepted. Spambots send informal messages to users which contain a link which once opened can contain any type of computer virus. Cyber attackers are also using natural disasters as a way to gain credit card information. They will start a group titled “Help Haiti Rebuild” or something similar with a link to insert credit card information to send money to those affected. Some hackers also take part in “phishing” which is a way to gain login names and passwords by presenting a fake login page. an excessive amount of spam was sent by a using account from which the passwords were phished and post a link to the malware.…

    • 943 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Diaz-Duque, O. (1989). Communication barriers in medical settings: Hispanics in the United States. International Journal of the Sociology of Language, 7993. Retrieved from SocINDEX with Full Text database.…

    • 1184 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    On-line social community is a medium that allow people to connect with their friends and share information, it is a way of networking but it is a social based relationship among its users. People join the social community by creating personal profile which can be set to private or made public, this network is primarily to connect with friends and share information ranging from photos, videos, comments, contact details, etc. However, many users have made their details public without carefully considering the consequence, hence; the on-line social communities have become a danger zone where people fear to tread on due to privacy policies being breached.…

    • 2024 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Annotated Bibliography

    • 1370 Words
    • 4 Pages

    (2) Rosenblum, David. "What anyone can know: The privacy risks of social networking sites." IEEE Security & Privacy 3 (2007): 40-49.…

    • 1370 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    MegaCorp is large manufacturing firm that operates 5 factories in Dallas, 4 factories in Los Angeles, and 5 factories in Albany, New York. It operates a tightly connected order management system that coordinates orders, raw materials, and inventory across all 14 factories.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ping is a standard utility system accessible on generally PCs. A ping utility sends test messages…

    • 430 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    In the two scenarios there are many ways that they can be solved or worked out to make them fit to the person working with them. They both deal with databases and communications that companies need to consider. In this paper we are going to discuss some of the options that companies or self employed business owners can use.…

    • 1014 Words
    • 4 Pages
    Good Essays
  • Good Essays

    2. Assume five devices are arranged in a mesh topology. How many cables are needed? How many ports are needed for each device?…

    • 430 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Network Theorms

    • 5524 Words
    • 23 Pages

    as current, voltage etc. which are produced in the circuit by the presence of active…

    • 5524 Words
    • 23 Pages
    Satisfactory Essays
  • Better Essays

    This paper will explain several differences between a logical network design and the physical design of a network. Most people tend to think of it as the logical meaning the functional part and the physical as the seeing it part. With saying that one must understand that there is more to the logical and physical design of a network than just the functional and seeing parts. In order for one to understand the differences of how the two operate and work from one to the other, one would need more information than just the functionality and seeing parts. In the following paragraphs of this paper, by trying to outline what makes up the differences between logical and physical design of a network one should then understand people purposes. Finally we will talk about how it is important for businesses. (EDrawSoft, 2007)…

    • 991 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    ME - 016 Printed Pages - 3 (Following Paper ID and Ron No. to be filled in your Answer Book) Roll No. I I…

    • 414 Words
    • 2 Pages
    Satisfactory Essays