Cited 212 time in
Social network security: Issues, challenges, threats, and solutions
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Rathore, Shailendra | - |
| dc.contributor.author | Sharma, Pradip Kumar | - |
| dc.contributor.author | Loia, Vincenzo | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Park, Jong Hyuk | - |
| dc.date.accessioned | 2024-08-08T04:31:24Z | - |
| dc.date.available | 2024-08-08T04:31:24Z | - |
| dc.date.issued | 2017-12 | - |
| dc.identifier.issn | 0020-0255 | - |
| dc.identifier.issn | 1872-6291 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/17983 | - |
| dc.description.abstract | Social networks are very popular in today's world. Millions of people use various forms of social networks as they allow individuals to connect with friends and family, and share private information. However, issues related to maintaining the privacy and security of a user's information can occur, especially when the user's uploaded content is multimedia, such as photos, videos, and audios. Uploaded multimedia content carries information that can be transmitted virally and almost instantaneously within a social networking site and beyond. In this paper, we present a comprehensive survey of different security and privacy threats that target every user of social networking sites. In addition, we separately focus on various threats that arise due to the sharing of multimedia content within a social networking site. We also discuss current state-of- the-art defense solutions that can protect social network users from these threats. We then present future direction and discuss some easy-to-apply response techniques to achieve the goal of a trustworthy and secure social network ecosystem. (C) 2017 Elsevier Inc. All rights reserved. | - |
| dc.format.extent | 27 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | ELSEVIER SCIENCE INC | - |
| dc.title | Social network security: Issues, challenges, threats, and solutions | - |
| dc.type | Article | - |
| dc.publisher.location | 미국 | - |
| dc.identifier.doi | 10.1016/j.ins.2017.08.063 | - |
| dc.identifier.scopusid | 2-s2.0-85028720663 | - |
| dc.identifier.wosid | 000413056000004 | - |
| dc.identifier.bibliographicCitation | INFORMATION SCIENCES, v.421, pp 43 - 69 | - |
| dc.citation.title | INFORMATION SCIENCES | - |
| dc.citation.volume | 421 | - |
| dc.citation.startPage | 43 | - |
| dc.citation.endPage | 69 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordPlus | ACCESS-CONTROL | - |
| dc.subject.keywordPlus | PRIVACY POLICIES | - |
| dc.subject.keywordPlus | DETECTION SYSTEM | - |
| dc.subject.keywordPlus | SPAM DETECTION | - |
| dc.subject.keywordPlus | MODEL | - |
| dc.subject.keywordPlus | COMMUNITY | - |
| dc.subject.keywordPlus | ATTACKS | - |
| dc.subject.keywordPlus | TRUST | - |
| dc.subject.keywordPlus | URLS | - |
| dc.subject.keywordAuthor | Social network service | - |
| dc.subject.keywordAuthor | Security and privacy | - |
| dc.subject.keywordAuthor | Multimedia data | - |
| dc.subject.keywordAuthor | Security threats | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
