This document discusses security and privacy issues related to Facebook, including cyber identity theft, cybersquatting, and spamming. The author proposes to develop a third-party application called "Footlight" to help Facebook users secure their privacy and security from identity theft. A literature review is presented on previous research related to security and privacy problems on social media sites like Facebook. The author aims to determine how to protect social networks from spamming and identity theft, evaluate the level of privacy sensitivity and spam rate, and detect identity theft on Facebook. The proposed research method involves a quantitative survey of 250 respondents to analyze security and privacy preferences and issues on Facebook.
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Internet Ethics Issues and Action in the United StatesMichael Zimmer
Presentation for the International Symposium on Internet Ethics" hosted by the Korea Internet & Security (KISA) and Korea Society of Internet Ethics (KSIE)
PERSONAL INFORMATION PRIVACY SETTINGS OF ONLINE SOCIAL NETWORKS AND THEIR S...ijsptm
Protecting personal information privacy has become a controversial issue among online social network
providers and users. Most social network providers have developed several techniques to decrease threats
and risks to the users’ privacy. These risks include the misuse of personal information which may lead to
illegal acts such as identity theft. This study aims to measure the awareness of users on protecting their
personal information privacy, as well as the suitability of the privacy systems which they use to modify
privacy settings. Survey results show high percentage of the use of smart phones for web services but the
current privacy settings for online social networks need to be improved to support different type of mobile
phones screens. Because most users use their mobilephones for Internet services, privacy settings that are
compatible with mobile phones need to be developed. The method of selecting privacy settings should also
be simplified to provide users with a clear picture of the data that will be shared with others. Results of this
study can be used to develop a new privacy system which will help users control their personal information
easily from different devices, including mobile Internet devices and computers.
There is no argument about the popularity of the social platforms such as Facebook, YouTube, twitter, etc. These platforms can be used to stay in touch with your friends, increase sales revenues for organizations and as a collaboration tool to stay connected with the public. However, each of these benefits comes at a cost, putting your private information at a risk/ exposed. We aim to discuss the common security risks associated with usage of these platforms including risk mitigation strategies.
Intro Video : https://www.youtube.com/watch?v=zxpa4dNVd3c
Presentation for Computer Society of Sri Lanka on 24 Feb 2015
This is a presentation Bill gave at the May 2009 NAISG meeting on the security dangers of such social networking entities as Facebook, LinkedIn and Twitter.
Internet Ethics Issues and Action in the United StatesMichael Zimmer
Presentation for the International Symposium on Internet Ethics" hosted by the Korea Internet & Security (KISA) and Korea Society of Internet Ethics (KSIE)
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Brandtzæg, P.B., & Heim, J. (2009). Why people use social networking sites. Proceedings of the HCI International. (pp. 143–152). In A.A. Ozok and P. Zaphiris (Eds.): Online Communities, LNCS. Springer-Verlag Berlin Heidelberg, San Diego, CA, USA, 19-24 July
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Professor Martin Wiseman presented on 'The Continuous Update Project - Breast cancer survivors and prostate cancer' on behalf of WCRF International at the SCPN conference 04/02/2015.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’ preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the results.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
Brandtzæg, P.B., & Heim, J. (2009). Why people use social networking sites. Proceedings of the HCI International. (pp. 143–152). In A.A. Ozok and P. Zaphiris (Eds.): Online Communities, LNCS. Springer-Verlag Berlin Heidelberg, San Diego, CA, USA, 19-24 July
How to Like Social Media Network SecurityBrian Honan
This is my presentation from Source Dublin 2014 on cyber crime and social media.
Social media networks provide individuals and businesses with exciting opportunities to communicate and collaborate with others throughout the world. But with these opportunities come a number of security challenges and risks. This talk will outline how social media networks can pose various threats to businesses, from information leakage, reputational damage, to social engineering profiling, and vectors for enabling compromise of corporate systems. Social media networks also enable the rapid dissemination of news which in the event of an information security breach could either save or destroy an organisations reputation. Understanding and dealing with these challenges will enable companies to like and favourite social media networks in a secure way.
Social Networking Sites have become the means of the communication and have
experienced growth in the recent years. As these sites offer services for free of costs are
attracting the people all around the world. Some technologies are emerging in the field of
Internet but still the users are facing the security leakages by unauthorized users. Many of
the Social Sites are managed by the Third Party Domains which keep track of all the user
information along with the access details. Most Online Social Networking (OSN) Sites
provide an “accept all or nothing” mechanism for managing permission from Third Party
Access (TPA) to access user’s private data [3]. The Social Media sites do not provide any
mechanism for privacy on the shared data among the multiple users. Many users share their
personal information without knowing about the cyber thefts and risks associated with it.
From the survey it has been found that the teenagers are least concerned about the
navigating privacy. Privacy associated with the Social media is the very crucial thing.
Different methods are discussed regarding sharing of the personal information and leakage
of this information through different mediums. Different models are also proposed in this
paper regarding the privacy control of third party access of the personal information. An
approach is proposed which allows users to share their access control configuration for TPA
s with their friends who can reuse and rate such configurations [3]
Categorize balanced dataset for troll detectionvivatechijri
As we know cyber bullying is increasing day by day and Cyber troll is one of the cyber-aggressive actions that is not much different from cyberbullying in online abuse so that the victims feel uncomfortable. One of the most used social media platforms in which cyber trolling frequently happens is Twitter. Basically, it is found that during an investigation of cyberbullying cases a lot of information gathered is false which aims to give discomfort, hatred and waste lots of time. So, it is necessary to classify between cyberbullying tweets and normal tweets on twitter. There has already been research on classification of cyberbullying tweets and normal tweets using the Support vector machine (SVM) algorithm. But the drawback of the system is that it only gives 63.83% of accuracy. Firstly, we can improve the accuracy of the system by using the Recurrent Neural Network (RNN) And Secondly, for balancing the dataset we will be using Synthetic Minority Over-sampling Technique (SMOTE). We believe that using these techniques we will be able to increase the accuracy of the previous proposed.
Professor Martin Wiseman presented on 'The Continuous Update Project - Breast cancer survivors and prostate cancer' on behalf of WCRF International at the SCPN conference 04/02/2015.
Identity theft is a rising threat, affecting more than 12.6 million Americans in 2012.
This slide introduces you to the 3 types of criminals and the methods they commonly use to steal your personal information.
Find out what you can do to protect yourself and avoid being the next victim of identity theft.
Identity theft: Developers are key - JFokus 2017Brian Vermeer
Identity theft is perhaps the most concerning kind of Cybercrime nowadays. The most concerning aspect of identity theft is that once you are a victim it is hard to get rid of the consequences. Although as developers we are probably well aware of the risks towards cybercrime and identity theft in particular, in many parts we as developers play a big role in making identity theft happen. It is not only about how secure is your program, but how aware are you? Or better said how naive are we in practice as developers in this big bad world.
Obesity May Cause Cancer but What Can We DoSpooky2 Rife
http://www.spooky2-mall.com/ - It has been proved that obesity is related to cancers, like cancer of stomach, liver, gallbladder, pancreas, ovary and thyroid. What can we do to manage our weight and health?
How to Protect Yourself From Identity TheftExperian_US
Join our #CreditChat every Wednesday at 3 p.m. ET on Twitter and YouTube. This week, we discussed the very important topic of identity theft and learned tips about how we can protect ourselves. This deck features highlights from our chat with tips from: @LeslieHTayneEsq, @NatlJumpStart, @Frostbe, @DebbiKing, @RAHomes, @SouthStateBank, @BahiyahShabazz, @WelshKristy, @yesiamcheap and @FacingFinances.
Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
1. Cyber Ethics and Cyber Crime
2. Security in Social Media & Risk of Child Internet
3. Social media in Schools and photo privacy
4. Risk of OSNs and Security, Privacy of Facebook
5. Risk and Security of Social Networking site Facebook and Twitter
6. Risk analysis of Government and Online Transaction
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyCSCJournals
Social networks can offer many services to the users for sharing activities events and their ideas. Many attacks can happened to the social networking websites due to trust that have been given by the users. Cyber threats are discussed in this paper. We study the types of cyber threats, classify them and give some suggestions to protect social networking websites of variety of attacks. Moreover, we gave some antithreats strategies with future trends.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
Bayesian theory and association rule mining methods are artificial intelligence techniques that have been used in various
computing fields, especially in machine learning. Internet has been considered as an easy ground for vices like radicalization because
of its diverse nature and ease of information access. These vices could be managed using recommender systems methods which are
used to deliver users’ preference data based on their previous interests and in relation with the community around the user. The
recommender systems are divided into two broad categories, i.e. collaborative systems which considers users which share the same
preferences as the user in question and content-based recommender systems tends to recommend websites similar to those already
liked by the user. Recent research and information from security organs indicate that, online radicalization has been growing at an
alarming rate. The paper reviews in depth what has been carried out in recommender systems and looks at how these methods could be
combined to from a strong system to monitor and manage online menace as a result of radicalization. The relationship between
different websites and the trend from continuous access of these websites forms the basis for probabilistic reasoning in understanding
the users’ behavior. Association rule mining method has been widely used in recommender systems in profiling and generating users’
preferences. To add probabilistic reasoning considering internet magnitude and more so in social media, Bayesian theory is
incorporated. Combination of this two techniques provides better analysis of the results thereby adding reliability and knowledge to the
results.
The advancement of Information Technology has hastened the ability to disseminate information across the globe. In particular, the recent trends in ‘Social Networking’ have led to a spark in personally sensitive information being published on the World Wide Web. While such socially active websites are creative tools for expressing one’s personality it also entails serious privacy concerns. Thus, Social Networking websites could be termed a double edged sword. It is important for the law to keep abreast of these developments in technology. The purpose of this paper is to demonstrate the limits of extending existing laws to battle privacy intrusions in the Internet especially in the context of social networking. It is suggested that privacy specific legislation is the most appropriate means of protecting online privacy. In doing so it is important to maintain a balance between the competing right of expression, the failure of which may hinder the reaping of benefits offered by Internet technology
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
A4.1
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2009
Forensics Tools for Social Network Security
Solution
s
Janet Cheng, Jennifer Hoffman, Therese LaMarche, Ahmet Tavil, Amit Yavad, and Steve Kim
Seidenberg School of CSIS, Pace University, White Plains, NY 10606, USA
Abstract
The usage of Social Network Sites has increased
rapidly in recent years. Since the success of a Social
Network Site depends on the number of users it
attracts, there is pressure on providers of Social
Network sites to design systems that encourage
behavior which increases both the number of users
and their connections. However, like any fast-
growing technology, security has not been a high
priority in the development of Social Network Sites.
As a result, along with the benefits of Social Network
Sites, significant security risks have resulted.
Providing Social Network Site users with tools which
will help protect them is ideal. Tools are developed
for installation on a user’s computer to provide them
the ability to retrieve other online user information
via chat and social network websites. These tools will
also benefit law enforcement agents when crimes are
committed.
1. Introduction
This paper analyzes and extends the forensic tools
developed in an earlier study for protecting Social
Network Site users from security threats [14]. First,
we will identify the security issues found in Social
Network Sites. Second, we will demonstrate how our
tools can provide users with more information which
we hope will help prevent them from becoming
victims. Finally, if a crime has been committed, we
will detail the tools available to assist in
apprehending the perpetrator.
The tools we developed retrieve Social Network Site
user’s non-personal-identifiable information, such as
IP address, operating system, browser type, etc.
Retrieval of this information occurs upon the virtual
contact from that other person, be it by them simply
browsing our personal page, or by other person
contacting via Virtual Meeting, for example chatting.
This paper covers methodologies used, test results,
and future goals.
The Social Network Site security issues are: [4]
Corporate Espionage; Cross Site Scripting, Viruses &
Worms; Social Network Site Aggregators; Spear
Phishing & Social Network specific Phishing;
Infiltration of Networks Leading to data leakage; I.D.
Theft; Bullying; Digital Dossier Aggregation
Vulnerabilities; Secondary Data Collection
Vulnerabilities; Face Recognition Vulnerabilities;
CBIR (Content-based Image Retrieval); Difficulty of
Complete Account Deletion; Spam; and Stalking.
2. Case Studies
There are many criminal activities arising from the
use of social network sites. For example, a mother
was convicted of computer fraud for her involvement
in creating a phony account on MySpace to trick a
teenager, who later committed suicide [15]. The
tools found in thi ...
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
Review of trends related to social network analysis in the enterprise. Presented at the 2010 Catalyst Conference in San Diego, CA july 29, 2010. Presented with Mike Gotta, Gartner Group.
1. FACEBOOK SECURITY AND PRIVACY:
CYBER IDENTITY
THEFT,CYBERSQUATING AND
SPAMMING
BALOGUN ABIODUN KAMORU (GS44360)
PhD Information Systems
Supervisory committee/Advisor
Pm Dr. Azmi bin Jaafar/ Pm Dr. Marzanah Jabar
.
2. Introduction
ABSTRACT
• Social engineering of Online Social networks sites focusing on Facebook
environ. I intend to explore the Facebook problem on spamming, identity
theft and cyber squatting. There is a broad consensus regarding the online
social networks especially Facebook. Studies from literature have shown
the usefulness and application of online social networks. Despite this,
research shows that they are still lapses on privacy and security issues like
identity theft, cyber squatting and spamming (what you did?).
• Facebook have many users globally, the significance and important reason
to embark on this research problem is to make the Facebook a safer
environ to its users. The real reason to take up this challenging issues of
online social networks especially on Facebook is to create a viable and
secured environs for the users, service providers, stakeholders and IT
professional, why they have to be security and privacy conscious while
surfing on online social networks especially Facebook. (Why you did it).
3. Introduction (cont’d)
• Previous attempts and studies in Online social networks especially
Facebook have used Model Virtual World Security Threat Matrix(STM )
have been very limited. This paper proposes a rigorous model technique
to measure the rate at which spamming,identity theft affect the Facebook,
a way forward to improve the security and privacy especially on spamming
and cybersquatting and cyber identity theft. Two different approaches will
be employed, firstly the Literature view of Online social networks
especially Facebook for comparative analysis, secondly the quantitative
approach technique will be used, Questionaire will be administer and the
respondent will be able to access and sent back respectively.(How you
did it?)
• This study usher a new era towards online social networks sites especially
Facebook, why the body of literature on information system with
emphasis on privacy and security with core leading emphasis on cyber
squatting,spamming and cyber identity theft. The results of the
experiment and the statistical/empirical tests supplemented by the actual
figure and test of the research method use.(what is found?).
4. Research Problem
• Problem of spamming on Facebook
• Problem of Cyber identity and Cyber
squatting.
• Problem associated with other Social
networks site like Twitter, Tagged etc
5. Purpose of study
• To develop a third party application (Footlight application)that will
help Facebook users to secure their privacy and security on identity
theft.
• To produce a guideline from Facebook user online from user design
perspective and trend of the new design in information systems.
• To contribute to increasing awareness about privacy and security
problems in online social networks especially facebook.
• To determine the the potential security threat pose to the online
users.
• To analysis the security and privacy preference set by the service
provider.
• To develop and mitigate anti spamming tools specifically for
facebook environ.
6. Research Questions
• How can we protect our social online networks free
from spamming and identity theft especially Facebook?
• In what way can I categories or evaluate the level of
spam and identity theft? Is rate of privacy sensitivity is
higher?
• How good is anti spamming? And how to detect
identity theft on Facebook?
• Why has the Facebook not take exclusive solution in
solving the problem? Why the previous solution not
working?
• What exactly the spamming issue and how does it
relate to security and Privacy?
7. Literature Review
• Social technologies never have predictable and
absolute positive or negative effects, which is
why social scientists dread questions like these. In
considering the effects of social network sites, it
is clear that there are many challenges to work
through -- the increasing commercialization of
this space, the need to construct strong privacy
protections for users, and safety issues -- but I
believe the benefits we receive as a society
provided by these tools far outweigh the risks.”
(Ellison, 2008).
8. Literature review
• The evaluation of the Internet to its current
phase commonly known as Web 2.0 has
brought more opportunities as well as
challenges for social application. One of the
major opportunities is the wide availability of
new online applications commonly described
as Social Media and particular new online
networking environments known as online
Social Networking Sites (Constantinides, at al.,
2010)
9. • Facebook security and privacy issue
Litearture Map Review for Facebook security and privacy
.Privacy
.Confidentiality
.Payment
.Authentication
.Intellectual Property theft
.Multiple identity
.Vandalism
.Defamation
.Transaction
Integrity
Privacy
issue of
faceboo
k.Leitch
&
Warren
2007
Security issue of
facebook.Alan
Oxley,2013
Security issue
challenging facebook.
Lee & Warren 2007.
Facebook security issue:
Spamming,Cyber identity
theft and Cyber squating
A phishing threat/Multiple
identity. Nalin Asanka,2014.
D.York,2013
Cyber identity theft Spamming Cyber
squatting
Electroni
c
theft,S.Sa
xby 2013
Multiple
identity
managemen
t.D.Millen
2007
Malwares,
Kaspersky
2013
Ransomewar
e/Spyware.
Mcafee,2013
massive
cyber
attack.J.Gille
s 2011
Phishing/Spoof
ing.
D.York,2012
10. Correlation of the Literature Map Review of Facebook Security and Privacy Issues:
Spamming
Facebook Security and
Privacy issue: Spamming
Problem
Effect of
Spamming
Cyber identity
theft Cyber squatting
Electronic
identity,Gros
sman 2010
Multiple
identity theft,
Dimicco,Mille
n,2007
Ransomewar
e/Espionage,
Steve
Saxby,2013
Economic
loss/Cyberwar
e,M.Potts
2013
Blocking of
spamming
Eliminate cyber identity theft and
cyber squatting by blocking spamming
Intellectual
Property
theft,Leitch
2010.
Facebook
identity
theft,C.Yao
2013.
Privacy and
security issue of
facebook,Leitch
& Warren 2007
Espionage/Politic
al
Vandetta,D.York
2012
Stealing of vital
information
Cyber
bullying,J.Giles,2
011
Defamation
Lee and
Warren,2007
Vandalism,Lee and
Warren,2007
Eliminate Cyber identity and Cybersquatting by Blocking Spamming
11. Conclusion
• From our finding and research , the research will
benefit the users of the Facebook, it will lead us
to the solution to dangerous threat pose by using
Facebook and other Online social networks, It
will benefit the stakeholders,policy makers and
decision makers on privacy and security issues. It
will also leads to the review of data protection
act. It will make the Facebook more secure and
Viable for the million users around the world.
12. Research Method
• Quantitative Method will be used
• Empirical method/Survey method
• Previous attempts and studies in Online social networks especially
Facebook have used Model Virtual World Security Threat Matrix(STM )
have been very limited.
• Data Set:
– New data set of 250 respondence
– Collection strategy: Questionnaire
– Place: universities in Malaysia
– Age of the participant: 18 and Above.
• The hypothesis will be verified/tested using Questionnaires through
survey
• SPSS will be used as statistical Tool to process the data and visualize the
output (Table, Bar chart).
13. Significance study
• The Internet has indeed revolutionized the way we think,
act and do things, since the advent of social networks and
its Application, there has being an increasing and demand
for users and developers to come to a common ground and
that is designing and implementing a privacy features.
• The study has significance on the field of information
system and to make our online social network more
secured, the study is made to have effects on facebook and
other online social networks
• Generally, it is significant to privacy advocates, security and
internet professional, Internet service provider,
Government agencies and research academy.
17. Reference
• S.Leitch, M.Warren,(2009) Security Issues Challenging Facebook,’ Australian Information Security
Mangement conference’,2009.
• DiMicco,J.M. and Millen,D.R.(2007)Identity management: Multiple presentations of self in
Facebook. Proceedings of the ACM Conference on organizational Computing and Groupware
Technologies (GROUP 2007)
• Dimmel,B.(2009) Identity theft worms hits Facebook. .
• F. Buccafurri,et al,.2014.”Analysis –preserving of user privacy against information leakage of social-
network likes” Information Sciences,2014.
• D.M. Boyd, N.B. Ellison,.2008 Social Network Sites: Definition,History,and Scholarship, Journal of
Computer-Mediated Communication, 2008.
• C.M Hoadley et al,. Privacy as information access and illusory control: The case of the Facebook
News Feed Privacy outcry. Electronic Commerce Research and Application,2008.
• O.Kulcu,T.Henkoglu, 2014 Privacy in Social networks: An analysis of Facebook, International Journal
of Information Management, 2014.
• Steve. Saxby, 2013 CLSR-LSPI seminar on electronic identity: The global challenge – Presented at
the 8th International Conference on Legal, Security and Privacy issues in IT Law (LSPI) November
11–15, 2013,
• Jim.Giles,2011Inside Facebook's massive cyber-security system, New scientist journal,2011.
• L.N. Zilatolas, Privacy antecedents for SNS self-disclosure: The case of Facebook, Computer in
Human behaviour Journal,2014