Ascertaining Trust Indicators in Social Networking Sites

Ascertaining Trust Indicators in Social Networking Sites

N. Veerasamy, W. A. Labuschagne
Copyright: © 2013 |Pages: 16
DOI: 10.4018/ijcwt.2013040102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The use of social network sites has exploded with its multitude of functions which include posting pictures, interests, activities and establishing contacts. However, users may be unaware of the lurking dangers of threats originating from Social Networking Sites (SNS) which include malware or fake profiles. This paper investigates the indicators to arouse suspicion that a social networking account is invalid with a specific focus on Facebook as an illustrative example. The results from a survey on users’ opinions on social networks, is presented in the paper. This helps reveal some of the trust indicators that leads users to ascertaining whether a social networking profile is valid or not. Finally, indicators of potentially deceptive agents and profiles are given as a guideline to help users decide whether they should proceed with interaction with certain contacts.
Article Preview
Top

Introduction

Social networks are increasingly popular due their wide range of communication capabilities like sharing photos, interests and even contacts. In social networks, individuals or groups with similar values, visions, goals, interests, or friendships can establish contact and start communicating. Online social networks have helped encouraged such interactions due to their ability to rapidly share information and support communications. Online social networks allow users to create profiles that can be shared with fellow contacts.

Social networking profile serves as an opportunity to grow a user’s connections and thus expand one’s contact circle which enhances their social currency. Increasingly people may use their profile to enhance their social status by gathering more contacts and posting more messages or updates. People may be attracted to those with strong social statuses and influential roles.

Social networks have grown tremendously in popularity due to a number of useful features. These features include:

  • Profile pages showing details and interests;

  • Ability to connect to like-minded individuals;

  • Lists of contacts;

  • Photo albums;

  • Messages;

  • Status updates;

  • Comments;

  • Games;

  • Applications;

  • Quizzes;

  • Advertising;

  • Links to other social networks;

  • Ability to make new contacts;

  • Contact lookup.

These features, to a large extent are attractive functions of social networks, with many users posting updates of their status, as well as establishing contacts and sharing content within social groups. Since social network provide the ability to make new contacts, users may be eager to accept friend requests and posted links. Users can receive multiple invitations to accept contacts and due to the implicit trust on social networks these invitations may be easily accepted without any consideration of the consequences.

Social networks provide for many functions. However, both malicious and beneficial activities be carried out using these platforms. Social engineering attacks may take advantage of users that are eager to interact and engage with a new contact made on a social networking site. Social engineering attacks occur when an attacker convinces a user to divulge sensitive information like passwords or system settings. Fake contacts may entice a user into believing they are real through compliments and gentle persuasion. However, the user remains in the dark completely unaware that the profile they are engaging with is invalid. Furthermore, social networking malware can be propagated from fake accounts or reposted messages.

These dangers raise important issues about understanding why users inherently trust these platforms. Understanding on why users trust social networks can help create security awareness to protect users from being attacked with social engineering techniques. It is, therefore, becoming vitally important that users be educated on the dangers of malware dispersal and fake personas.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024)
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing