SlideShare a Scribd company logo
FACEBOOK SECURITY AND PRIVACY:
CYBER IDENTITY
THEFT,CYBERSQUATING AND
SPAMMING
BALOGUN ABIODUN KAMORU (GS44360)
PhD Information Systems
Supervisory committee/Advisor
Pm Dr. Azmi bin Jaafar/ Pm Dr. Marzanah Jabar
.
Introduction
ABSTRACT
• Social engineering of Online Social networks sites focusing on Facebook
environ. I intend to explore the Facebook problem on spamming, identity
theft and cyber squatting. There is a broad consensus regarding the online
social networks especially Facebook. Studies from literature have shown
the usefulness and application of online social networks. Despite this,
research shows that they are still lapses on privacy and security issues like
identity theft, cyber squatting and spamming (what you did?).
• Facebook have many users globally, the significance and important reason
to embark on this research problem is to make the Facebook a safer
environ to its users. The real reason to take up this challenging issues of
online social networks especially on Facebook is to create a viable and
secured environs for the users, service providers, stakeholders and IT
professional, why they have to be security and privacy conscious while
surfing on online social networks especially Facebook. (Why you did it).
Introduction (cont’d)
• Previous attempts and studies in Online social networks especially
Facebook have used Model Virtual World Security Threat Matrix(STM )
have been very limited. This paper proposes a rigorous model technique
to measure the rate at which spamming,identity theft affect the Facebook,
a way forward to improve the security and privacy especially on spamming
and cybersquatting and cyber identity theft. Two different approaches will
be employed, firstly the Literature view of Online social networks
especially Facebook for comparative analysis, secondly the quantitative
approach technique will be used, Questionaire will be administer and the
respondent will be able to access and sent back respectively.(How you
did it?)
• This study usher a new era towards online social networks sites especially
Facebook, why the body of literature on information system with
emphasis on privacy and security with core leading emphasis on cyber
squatting,spamming and cyber identity theft. The results of the
experiment and the statistical/empirical tests supplemented by the actual
figure and test of the research method use.(what is found?).
Research Problem
• Problem of spamming on Facebook
• Problem of Cyber identity and Cyber
squatting.
• Problem associated with other Social
networks site like Twitter, Tagged etc
Purpose of study
• To develop a third party application (Footlight application)that will
help Facebook users to secure their privacy and security on identity
theft.
• To produce a guideline from Facebook user online from user design
perspective and trend of the new design in information systems.
• To contribute to increasing awareness about privacy and security
problems in online social networks especially facebook.
• To determine the the potential security threat pose to the online
users.
• To analysis the security and privacy preference set by the service
provider.
• To develop and mitigate anti spamming tools specifically for
facebook environ.
Research Questions
• How can we protect our social online networks free
from spamming and identity theft especially Facebook?
• In what way can I categories or evaluate the level of
spam and identity theft? Is rate of privacy sensitivity is
higher?
• How good is anti spamming? And how to detect
identity theft on Facebook?
• Why has the Facebook not take exclusive solution in
solving the problem? Why the previous solution not
working?
• What exactly the spamming issue and how does it
relate to security and Privacy?
Literature Review
• Social technologies never have predictable and
absolute positive or negative effects, which is
why social scientists dread questions like these. In
considering the effects of social network sites, it
is clear that there are many challenges to work
through -- the increasing commercialization of
this space, the need to construct strong privacy
protections for users, and safety issues -- but I
believe the benefits we receive as a society
provided by these tools far outweigh the risks.”
(Ellison, 2008).
Literature review
• The evaluation of the Internet to its current
phase commonly known as Web 2.0 has
brought more opportunities as well as
challenges for social application. One of the
major opportunities is the wide availability of
new online applications commonly described
as Social Media and particular new online
networking environments known as online
Social Networking Sites (Constantinides, at al.,
2010)
• Facebook security and privacy issue
Litearture Map Review for Facebook security and privacy
.Privacy
.Confidentiality
.Payment
.Authentication
.Intellectual Property theft
.Multiple identity
.Vandalism
.Defamation
.Transaction
Integrity
Privacy
issue of
faceboo
k.Leitch
&
Warren
2007
Security issue of
facebook.Alan
Oxley,2013
Security issue
challenging facebook.
Lee & Warren 2007.
Facebook security issue:
Spamming,Cyber identity
theft and Cyber squating
A phishing threat/Multiple
identity. Nalin Asanka,2014.
D.York,2013
Cyber identity theft Spamming Cyber
squatting
Electroni
c
theft,S.Sa
xby 2013
Multiple
identity
managemen
t.D.Millen
2007
Malwares,
Kaspersky
2013
Ransomewar
e/Spyware.
Mcafee,2013
massive
cyber
attack.J.Gille
s 2011
Phishing/Spoof
ing.
D.York,2012
Correlation of the Literature Map Review of Facebook Security and Privacy Issues:
Spamming
Facebook Security and
Privacy issue: Spamming
Problem
Effect of
Spamming
Cyber identity
theft Cyber squatting
Electronic
identity,Gros
sman 2010
Multiple
identity theft,
Dimicco,Mille
n,2007
Ransomewar
e/Espionage,
Steve
Saxby,2013
Economic
loss/Cyberwar
e,M.Potts
2013
Blocking of
spamming
Eliminate cyber identity theft and
cyber squatting by blocking spamming
Intellectual
Property
theft,Leitch
2010.
Facebook
identity
theft,C.Yao
2013.
Privacy and
security issue of
facebook,Leitch
& Warren 2007
Espionage/Politic
al
Vandetta,D.York
2012
Stealing of vital
information
Cyber
bullying,J.Giles,2
011
Defamation
Lee and
Warren,2007
Vandalism,Lee and
Warren,2007
Eliminate Cyber identity and Cybersquatting by Blocking Spamming
Conclusion
• From our finding and research , the research will
benefit the users of the Facebook, it will lead us
to the solution to dangerous threat pose by using
Facebook and other Online social networks, It
will benefit the stakeholders,policy makers and
decision makers on privacy and security issues. It
will also leads to the review of data protection
act. It will make the Facebook more secure and
Viable for the million users around the world.
Research Method
• Quantitative Method will be used
• Empirical method/Survey method
• Previous attempts and studies in Online social networks especially
Facebook have used Model Virtual World Security Threat Matrix(STM )
have been very limited.
• Data Set:
– New data set of 250 respondence
– Collection strategy: Questionnaire
– Place: universities in Malaysia
– Age of the participant: 18 and Above.
• The hypothesis will be verified/tested using Questionnaires through
survey
• SPSS will be used as statistical Tool to process the data and visualize the
output (Table, Bar chart).
Significance study
• The Internet has indeed revolutionized the way we think,
act and do things, since the advent of social networks and
its Application, there has being an increasing and demand
for users and developers to come to a common ground and
that is designing and implementing a privacy features.
• The study has significance on the field of information
system and to make our online social network more
secured, the study is made to have effects on facebook and
other online social networks
• Generally, it is significant to privacy advocates, security and
internet professional, Internet service provider,
Government agencies and research academy.
Project Schedule
Project Schedule
Project schedule
Reference
• S.Leitch, M.Warren,(2009) Security Issues Challenging Facebook,’ Australian Information Security
Mangement conference’,2009.
• DiMicco,J.M. and Millen,D.R.(2007)Identity management: Multiple presentations of self in
Facebook. Proceedings of the ACM Conference on organizational Computing and Groupware
Technologies (GROUP 2007)
• Dimmel,B.(2009) Identity theft worms hits Facebook. .
• F. Buccafurri,et al,.2014.”Analysis –preserving of user privacy against information leakage of social-
network likes” Information Sciences,2014.
• D.M. Boyd, N.B. Ellison,.2008 Social Network Sites: Definition,History,and Scholarship, Journal of
Computer-Mediated Communication, 2008.
• C.M Hoadley et al,. Privacy as information access and illusory control: The case of the Facebook
News Feed Privacy outcry. Electronic Commerce Research and Application,2008.
• O.Kulcu,T.Henkoglu, 2014 Privacy in Social networks: An analysis of Facebook, International Journal
of Information Management, 2014.
• Steve. Saxby, 2013 CLSR-LSPI seminar on electronic identity: The global challenge – Presented at
the 8th International Conference on Legal, Security and Privacy issues in IT Law (LSPI) November
11–15, 2013,
• Jim.Giles,2011Inside Facebook's massive cyber-security system, New scientist journal,2011.
• L.N. Zilatolas, Privacy antecedents for SNS self-disclosure: The case of Facebook, Computer in
Human behaviour Journal,2014
Terima Kasih | Thank You

More Related Content

What's hot

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptxPink Elephant
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
ITIIIndustries
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
Jacque Lewis
 
Why people use social networking sites
Why people use social networking sitesWhy people use social networking sites
Why people use social networking sites
Petter Bae Brandtzæg
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
Noori Sadeq
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
Brian Honan
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityDavid B. Whittier, Ed D
 
549 458-465
549 458-465549 458-465
549 458-465
idescitation
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentationcentrelink
 
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
Arshad Ahmed Saeed
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
vivatechijri
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
Academic Research Paper Writing Services
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
Bryan Tran
 
11.face location a novel approach to post the user global location
11.face location   a novel approach to post the user global location11.face location   a novel approach to post the user global location
11.face location a novel approach to post the user global location
Alexander Decker
 
G05913234
G05913234G05913234
G05913234
IOSR-JEN
 
An introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in edAn introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in ed
Khairul Nisa
 

What's hot (17)

Social media and security essentials.pptx
Social media and security essentials.pptxSocial media and security essentials.pptx
Social media and security essentials.pptx
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Investigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet SecurityInvestigating Tertiary Students’ Perceptions on Internet Security
Investigating Tertiary Students’ Perceptions on Internet Security
 
Jacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o scriptJacque lewis - Senior Project -w/o script
Jacque lewis - Senior Project -w/o script
 
Why people use social networking sites
Why people use social networking sitesWhy people use social networking sites
Why people use social networking sites
 
The issues of security and privacy in social network
The issues of security and privacy in social network The issues of security and privacy in social network
The issues of security and privacy in social network
 
How to Like Social Media Network Security
How to Like Social Media Network SecurityHow to Like Social Media Network Security
How to Like Social Media Network Security
 
Cyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school communityCyberethics for teachers, students, and the school community
Cyberethics for teachers, students, and the school community
 
549 458-465
549 458-465549 458-465
549 458-465
 
Cyber bullying presentation
Cyber bullying presentationCyber bullying presentation
Cyber bullying presentation
 
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCEINTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
INTERNET AND ITS IMPACT ON STUDENT PERFORMANCE
 
Categorize balanced dataset for troll detection
Categorize balanced dataset for troll detectionCategorize balanced dataset for troll detection
Categorize balanced dataset for troll detection
 
Globalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethicsGlobalcompose.com sample essay paper on cyber ethics
Globalcompose.com sample essay paper on cyber ethics
 
Privacy issues in social networking
Privacy issues in social networkingPrivacy issues in social networking
Privacy issues in social networking
 
11.face location a novel approach to post the user global location
11.face location   a novel approach to post the user global location11.face location   a novel approach to post the user global location
11.face location a novel approach to post the user global location
 
G05913234
G05913234G05913234
G05913234
 
An introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in edAn introduction to the potential of social networking sites in ed
An introduction to the potential of social networking sites in ed
 

Viewers also liked

Tim Byers Presentations International Congress on Obesity
Tim Byers Presentations International Congress on ObesityTim Byers Presentations International Congress on Obesity
Tim Byers Presentations International Congress on ObesityWCRF International
 
Why Weight is Important in Cancer | Dr Martin Wiseman
Why Weight is Important in Cancer | Dr Martin WisemanWhy Weight is Important in Cancer | Dr Martin Wiseman
Why Weight is Important in Cancer | Dr Martin Wiseman
Scottish Cancer Prevention Network
 
The Continuous Update Project | Prof. Martin Wiseman
The Continuous Update Project | Prof. Martin WisemanThe Continuous Update Project | Prof. Martin Wiseman
The Continuous Update Project | Prof. Martin Wiseman
Scottish Cancer Prevention Network
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSGreg Ewers
 
2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information
Lynn Kronk
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
hotspotshield
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
The Texas Network, LLC
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
English Online Inc.
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActAmin Bandeali
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljug
Brian Vermeer
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017
Brian Vermeer
 
Obesity May Cause Cancer but What Can We Do
Obesity May Cause Cancer but What Can We DoObesity May Cause Cancer but What Can We Do
Obesity May Cause Cancer but What Can We Do
Spooky2 Rife
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
Experian_US
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
milfamln
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
robinlgray
 

Viewers also liked (20)

Tim Byers Presentations International Congress on Obesity
Tim Byers Presentations International Congress on ObesityTim Byers Presentations International Congress on Obesity
Tim Byers Presentations International Congress on Obesity
 
Why Weight is Important in Cancer | Dr Martin Wiseman
Why Weight is Important in Cancer | Dr Martin WisemanWhy Weight is Important in Cancer | Dr Martin Wiseman
Why Weight is Important in Cancer | Dr Martin Wiseman
 
The Continuous Update Project | Prof. Martin Wiseman
The Continuous Update Project | Prof. Martin WisemanThe Continuous Update Project | Prof. Martin Wiseman
The Continuous Update Project | Prof. Martin Wiseman
 
PREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERSPREVENTING ID THEFT GUIDE FOR CONSUMERS
PREVENTING ID THEFT GUIDE FOR CONSUMERS
 
2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information
 
Social Illness-Cyber Crime
Social Illness-Cyber CrimeSocial Illness-Cyber Crime
Social Illness-Cyber Crime
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Obesity and Breast cancer
Obesity and Breast cancer Obesity and Breast cancer
Obesity and Breast cancer
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID Act
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljug
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017
 
Obesity May Cause Cancer but What Can We Do
Obesity May Cause Cancer but What Can We DoObesity May Cause Cancer but What Can We Do
Obesity May Cause Cancer but What Can We Do
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 

Similar to Faculty presentation 21 st december 2015

6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location
Alexander Decker
 
L017146571
L017146571L017146571
L017146571
IOSR Journals
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Anil Dhami
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
IRJET Journal
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
u3037519
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
204
204204
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
joyjonna282
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
Marc Smith
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
Esteban Romero Frías
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaKenie Moses
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsDr. V Vorvoreanu
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
Supriya Radhakrishna
 

Similar to Faculty presentation 21 st december 2015 (20)

6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location6.[34 38]face location - a novel approach to post the user global location
6.[34 38]face location - a novel approach to post the user global location
 
L017146571
L017146571L017146571
L017146571
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
 
IRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text MiningIRJET- Secure Social Network using Text Mining
IRJET- Secure Social Network using Text Mining
 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Order 32740459
Order 32740459Order 32740459
Order 32740459
 
Ejis Analysis
Ejis AnalysisEjis Analysis
Ejis Analysis
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
204
204204
204
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
Knowledge management for professionals
Knowledge management for professionalsKnowledge management for professionals
Knowledge management for professionals
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
Security Concerns With Privacy in Social Media
Security Concerns With Privacy in Social MediaSecurity Concerns With Privacy in Social Media
Security Concerns With Privacy in Social Media
 
Security Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIsSecurity Privacy Concerns Third Party APIs
Security Privacy Concerns Third Party APIs
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
 
Facebook
FacebookFacebook
Facebook
 
Big data privacy issues in public social media
Big data privacy issues in public social mediaBig data privacy issues in public social media
Big data privacy issues in public social media
 

Faculty presentation 21 st december 2015

  • 1. FACEBOOK SECURITY AND PRIVACY: CYBER IDENTITY THEFT,CYBERSQUATING AND SPAMMING BALOGUN ABIODUN KAMORU (GS44360) PhD Information Systems Supervisory committee/Advisor Pm Dr. Azmi bin Jaafar/ Pm Dr. Marzanah Jabar .
  • 2. Introduction ABSTRACT • Social engineering of Online Social networks sites focusing on Facebook environ. I intend to explore the Facebook problem on spamming, identity theft and cyber squatting. There is a broad consensus regarding the online social networks especially Facebook. Studies from literature have shown the usefulness and application of online social networks. Despite this, research shows that they are still lapses on privacy and security issues like identity theft, cyber squatting and spamming (what you did?). • Facebook have many users globally, the significance and important reason to embark on this research problem is to make the Facebook a safer environ to its users. The real reason to take up this challenging issues of online social networks especially on Facebook is to create a viable and secured environs for the users, service providers, stakeholders and IT professional, why they have to be security and privacy conscious while surfing on online social networks especially Facebook. (Why you did it).
  • 3. Introduction (cont’d) • Previous attempts and studies in Online social networks especially Facebook have used Model Virtual World Security Threat Matrix(STM ) have been very limited. This paper proposes a rigorous model technique to measure the rate at which spamming,identity theft affect the Facebook, a way forward to improve the security and privacy especially on spamming and cybersquatting and cyber identity theft. Two different approaches will be employed, firstly the Literature view of Online social networks especially Facebook for comparative analysis, secondly the quantitative approach technique will be used, Questionaire will be administer and the respondent will be able to access and sent back respectively.(How you did it?) • This study usher a new era towards online social networks sites especially Facebook, why the body of literature on information system with emphasis on privacy and security with core leading emphasis on cyber squatting,spamming and cyber identity theft. The results of the experiment and the statistical/empirical tests supplemented by the actual figure and test of the research method use.(what is found?).
  • 4. Research Problem • Problem of spamming on Facebook • Problem of Cyber identity and Cyber squatting. • Problem associated with other Social networks site like Twitter, Tagged etc
  • 5. Purpose of study • To develop a third party application (Footlight application)that will help Facebook users to secure their privacy and security on identity theft. • To produce a guideline from Facebook user online from user design perspective and trend of the new design in information systems. • To contribute to increasing awareness about privacy and security problems in online social networks especially facebook. • To determine the the potential security threat pose to the online users. • To analysis the security and privacy preference set by the service provider. • To develop and mitigate anti spamming tools specifically for facebook environ.
  • 6. Research Questions • How can we protect our social online networks free from spamming and identity theft especially Facebook? • In what way can I categories or evaluate the level of spam and identity theft? Is rate of privacy sensitivity is higher? • How good is anti spamming? And how to detect identity theft on Facebook? • Why has the Facebook not take exclusive solution in solving the problem? Why the previous solution not working? • What exactly the spamming issue and how does it relate to security and Privacy?
  • 7. Literature Review • Social technologies never have predictable and absolute positive or negative effects, which is why social scientists dread questions like these. In considering the effects of social network sites, it is clear that there are many challenges to work through -- the increasing commercialization of this space, the need to construct strong privacy protections for users, and safety issues -- but I believe the benefits we receive as a society provided by these tools far outweigh the risks.” (Ellison, 2008).
  • 8. Literature review • The evaluation of the Internet to its current phase commonly known as Web 2.0 has brought more opportunities as well as challenges for social application. One of the major opportunities is the wide availability of new online applications commonly described as Social Media and particular new online networking environments known as online Social Networking Sites (Constantinides, at al., 2010)
  • 9. • Facebook security and privacy issue Litearture Map Review for Facebook security and privacy .Privacy .Confidentiality .Payment .Authentication .Intellectual Property theft .Multiple identity .Vandalism .Defamation .Transaction Integrity Privacy issue of faceboo k.Leitch & Warren 2007 Security issue of facebook.Alan Oxley,2013 Security issue challenging facebook. Lee & Warren 2007. Facebook security issue: Spamming,Cyber identity theft and Cyber squating A phishing threat/Multiple identity. Nalin Asanka,2014. D.York,2013 Cyber identity theft Spamming Cyber squatting Electroni c theft,S.Sa xby 2013 Multiple identity managemen t.D.Millen 2007 Malwares, Kaspersky 2013 Ransomewar e/Spyware. Mcafee,2013 massive cyber attack.J.Gille s 2011 Phishing/Spoof ing. D.York,2012
  • 10. Correlation of the Literature Map Review of Facebook Security and Privacy Issues: Spamming Facebook Security and Privacy issue: Spamming Problem Effect of Spamming Cyber identity theft Cyber squatting Electronic identity,Gros sman 2010 Multiple identity theft, Dimicco,Mille n,2007 Ransomewar e/Espionage, Steve Saxby,2013 Economic loss/Cyberwar e,M.Potts 2013 Blocking of spamming Eliminate cyber identity theft and cyber squatting by blocking spamming Intellectual Property theft,Leitch 2010. Facebook identity theft,C.Yao 2013. Privacy and security issue of facebook,Leitch & Warren 2007 Espionage/Politic al Vandetta,D.York 2012 Stealing of vital information Cyber bullying,J.Giles,2 011 Defamation Lee and Warren,2007 Vandalism,Lee and Warren,2007 Eliminate Cyber identity and Cybersquatting by Blocking Spamming
  • 11. Conclusion • From our finding and research , the research will benefit the users of the Facebook, it will lead us to the solution to dangerous threat pose by using Facebook and other Online social networks, It will benefit the stakeholders,policy makers and decision makers on privacy and security issues. It will also leads to the review of data protection act. It will make the Facebook more secure and Viable for the million users around the world.
  • 12. Research Method • Quantitative Method will be used • Empirical method/Survey method • Previous attempts and studies in Online social networks especially Facebook have used Model Virtual World Security Threat Matrix(STM ) have been very limited. • Data Set: – New data set of 250 respondence – Collection strategy: Questionnaire – Place: universities in Malaysia – Age of the participant: 18 and Above. • The hypothesis will be verified/tested using Questionnaires through survey • SPSS will be used as statistical Tool to process the data and visualize the output (Table, Bar chart).
  • 13. Significance study • The Internet has indeed revolutionized the way we think, act and do things, since the advent of social networks and its Application, there has being an increasing and demand for users and developers to come to a common ground and that is designing and implementing a privacy features. • The study has significance on the field of information system and to make our online social network more secured, the study is made to have effects on facebook and other online social networks • Generally, it is significant to privacy advocates, security and internet professional, Internet service provider, Government agencies and research academy.
  • 17. Reference • S.Leitch, M.Warren,(2009) Security Issues Challenging Facebook,’ Australian Information Security Mangement conference’,2009. • DiMicco,J.M. and Millen,D.R.(2007)Identity management: Multiple presentations of self in Facebook. Proceedings of the ACM Conference on organizational Computing and Groupware Technologies (GROUP 2007) • Dimmel,B.(2009) Identity theft worms hits Facebook. . • F. Buccafurri,et al,.2014.”Analysis –preserving of user privacy against information leakage of social- network likes” Information Sciences,2014. • D.M. Boyd, N.B. Ellison,.2008 Social Network Sites: Definition,History,and Scholarship, Journal of Computer-Mediated Communication, 2008. • C.M Hoadley et al,. Privacy as information access and illusory control: The case of the Facebook News Feed Privacy outcry. Electronic Commerce Research and Application,2008. • O.Kulcu,T.Henkoglu, 2014 Privacy in Social networks: An analysis of Facebook, International Journal of Information Management, 2014. • Steve. Saxby, 2013 CLSR-LSPI seminar on electronic identity: The global challenge – Presented at the 8th International Conference on Legal, Security and Privacy issues in IT Law (LSPI) November 11–15, 2013, • Jim.Giles,2011Inside Facebook's massive cyber-security system, New scientist journal,2011. • L.N. Zilatolas, Privacy antecedents for SNS self-disclosure: The case of Facebook, Computer in Human behaviour Journal,2014
  • 18. Terima Kasih | Thank You