IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Security and Privacy in Social Networks

Security and Privacy in Social Networks
View Sample PDF
Author(s): Barbara Carminati (Università degli Studi dell’Insubria, Italy), Elena Ferrari (Università degli Studi dell’Insubria, Italy)and Andrea Perego (Università degli Studi dell’Insubria, Italy)
Copyright: 2010
Pages: 12
Source title: Social Computing: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Subhasish Dasgupta (George Washington University, USA)
DOI: 10.4018/978-1-60566-984-7.ch110

Purchase

View Security and Privacy in Social Networks on the publisher's website for pricing and purchasing information.

Abstract

Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations (Staab et al., 2005). Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies (Brickley & Miller, 2005; Davis & Vitiello, 2005; Golbeck, 2004), accessing and disseminating information over multiple WBSNs has been made simpler (Ding, Zhou, Finin, & Joshi, 2005). If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. As a matter of fact, users’ personal data and resources are regularly exploited not only by companies for marketing purposes, but also by governments and institutions for tracking persons’ behaviors and opinions, and in the worst case, by online predators (Barnes, 2006).

Related Content

Nitesh Behare, Rashmi D. Mahajan, Meenakshi Singh, Vishwanathan Iyer, Ushmita Gupta, Pritesh P. Somani. © 2024. 36 pages.
Shikha Mittal. © 2024. 21 pages.
Albérico Travassos Rosário. © 2024. 31 pages.
Carla Sofia Ribeiro Murteira, Ana Cristina Antunes. © 2024. 23 pages.
Mario Sierra Martin, Alvaro Díaz Casquero, Marina Sánchez Pérez, Bárbara Rando Rodríguez. © 2024. 17 pages.
Poornima Nair, Sunita Kumar. © 2024. 18 pages.
Neli Maria Mengalli, Antonio Aparecido Carvalho. © 2024. 16 pages.
Body Bottom