1 / 12

Online Social Networks and Security and Privacy Risks

Online Social Networks and Security and Privacy Risks. DCS860A-2008 Team 2 Andrew Boyd, Kaven Williams, and Sridevi Puramsetti. Online Social Networks. Social networks on the web have become the new preferred place for gathering, living ones private lives in a public domain

lexi
Download Presentation

Online Social Networks and Security and Privacy Risks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Online Social Networks and Security and Privacy Risks DCS860A-2008 Team 2 Andrew Boyd, Kaven Williams, and Sridevi Puramsetti

  2. Online Social Networks • Social networks on the web have become the new preferred place for gathering, living ones private lives in a public domain • Dramatic increase in participation over the past few years with no signs of a slowdown in their growth

  3. Online Social Networks conti. • Eg. Facebook, Linkedin, and MySpace • Require users to create an online profile for the main purpose of sharing information (some personal) with other users. • Individuals interact with each other both socially and professionally • engaged in activities and relationships that at times mimicking in-person interactions

  4. Problem • Users often willing to divulging personal and private information • Users post sensitive personal and private information in these domains • Participate in activities the user might consider private • Creating permanent records which can in the future affect them negatively • Opens the user to public scrutiny possible • Users not knowing who is accessing there private information

  5. Online Social Networks Security Risks • Identity theft, • Online stalking • Unrelated third parties such as, businesses collecting market data, employers, government agencies wanting to review users’ personal data, • Court orders

  6. Security & Privacy Concerns • Studies have shown that there are many factors which influence users’ online privacy management. • demographic factors, such as age, income, and education • security knowledge • social Context • user interface design

  7. Hypothesis • Online Security behavior is different for different demographic group; online Security behavior various based on security knowledge; online security behavior various according to social Context; online Security behavior in influenced by user interface design.

  8. Purpose of this Research • The primary purpose of this research is to determine whether users’ attitudes towards online privacy vary by demographics, social context, and security knowledge. • We believe the factors influencing online privacy management are demographic profile, security education, user interface design and social context

  9. Methodology • Methodology could be following to gather their response any or a combination, of the following techniques can be used in gathering information relevant to the privacy protection within its operational boundary • Questionnaire • On-site Interviews • Document Review • Use of Automated Scanning Tool

  10. Expectations • Display the relationship among factors influencing Online Privacy Behaviour • Applications in future design of educational modules • Constraints- Privacy threats are evolving rapidly • Future Work- Predictive models for Privacy behaviour?

  11. Contributions to Field of Study • Privacy Matters: we need to understand why people behave in seemingly irrational manners online. • This issue affects every single online user.

  12. References • [1]D. Rosenblum, "What Anyone Can Know: The Privacy Risks of Social Networking Sites," IEEE Security and Privacy, vol. 5, no. 3, pp. 40-49, May/Jun, 2007 • [2]Denise Anthony, Tristan Henderson, David Kotz, "Privacy in Location-Aware Computing Environments," IEEE Pervasive Computing, vol. 6, no. 4, pp. 64-72, Oct-Dec, 2007 • [4]Lisa Singh, Justin Zhan, "Measuring Topological Anonymity in Social Networks," grc,pp.770, 2007 IEEE International Conference on Granular Computing (GRC 2007), 2007 • Quentin Jones, Sukeshini A. Grandhi, "P3 Systems: Putting the Place Back into Social Networks," IEEE Internet Computing, vol. 9, no. 5, pp. 38-46, Sep/Oct, • [5] Borisov and Lucas. FlyByNight: mitigating the privacy risks of social networking. Proceedings of the 7th ACM workshop on Privacy in the electronic society, Alexandria, Virginia, 2008, Pages 1-8, • [6]Gross, Ralph, Alessandro Acquisti, and H. John Heinz III., “Information Revelation and Privacy in Online Social Networks”, Proceedings of the 2005 ACM Workshop on • Privacy in the Electronic Society, pp. 71-80, Alexandria, Virginia, 2005 • [7] K. Borders, G. Brown, T. Howe, M. Ihbe, and A. Prakash, “Social Networks and Context-Aware Spam”, Proceedings of the ACM 2008 conference on Computer supported cooperative work, pp. 403-412 . San Diego, CA, 2008 • [8] B. Krishnamurthy and C. Wills, “Characterizing privacy in online social networks”, • Proceedings of the first workshop on Online social networks, pp. 37-42, Seattle, WA, 2008 • [9] I. Brown T. Zukowski, “Examining the influence of demographic factors on internet users' information privacy concerns”, Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, pp. 197–204, Port Elizabeth, South Africa, 2007 • [10] A. Korolova, R. Motwani, and S. Nabar, “Link privacy in social networks”, Proceeding of the 17th ACM conference on Information and knowledge management, pp. 289-298, Napa Valley, California, 2008 • [11] Palen, Leysia and Dourish, Paul “Unpacking “Privacy” for a Networked World” CHI 2003, Ft. Lauderdale, Florida, USA. • [12] Raento, Mika and Oulasvirta, Antti “Designing for privacy and self-preservation in social awareness”, Personal Ubiquitous Computing, vol. 12, pp. 527-542, 2008. • [13] Conti, Gregory and Sobiesk, Edward “An Honest man has Nothing to Fear: User Perceptions on Web-based Information Disclosure”, Symposium on Usable Privacy and Security (SOUPS) 2007, Pittsburgh, PA, USA. • [14] Strater, Katherine and Richter, Heather “Examining Privacy and Disclosure in a Social Networking Community”, Symposium on Usable Privacy and Security (SOUPS) 2007, Pittsburgh, PA, USA.

More Related