Information Security Problem and Solution Approaches in Social Applications

Information Security Problem and Solution Approaches in Social Applications

Mamata Rath (Birla Global University, India)
Copyright: © 2019 |Pages: 14
DOI: 10.4018/978-1-5225-7879-6.ch009
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


A social network is a portrayal of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. This chapter exhibits an exhaustive review of various security and protection issues in social networks that directly or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused on that appear because of the sharing of interactive media content inside a social networking site. Additionally, the chapter also reports current cutting-edge guard arrangements that can shield social network clients from these dangers.
Chapter Preview

1. Introduction

From simple communication network currently there are evolution of the Social Networks which are based on emerging technology that stand their base very strong with formation of social sites with group members which have high influential capability to control and communicate the social networks as per their own strategy. Therefore design issues are going to be very tedious by considering all the emerging challenges in such a magnificent network. Social networks such as Facebook has attracted millions of users in recent past and the members are increasing day by day (Rath, 2014). People use social networks to communicate information with other people located at different geographical distance within fraction of time and to spread the relevant information globally sometimes for marketing purpose too.Smart mobile devices and a large number of social mobile applications are currently emerging that encourage distinctive associations amongst users of the social networks (Rath, 2018). Though this is a developing collaborative force in digital social networks, but privacy issue is a major concern among the clients. The expanding number of users of such applications is a challenge and threat for users as well as the developers. This is because of the growing number of clients of such applications and the idea of setting up trust among such users. In this exploration, we will address such protection concerns considering the clients' perspectives and their acknowledgment of such applications. The exploration will illustrate a portion of the recommended components to support clients' trust in social communications.

Figure 1.

Common activities in a social network site


A social network is a explanation of the social structure involving members, mostly individuals or associations. It represents the ways in which they are connected throughout various social familiarities ranging from casual social contact to close familiar bonds. The informal organization is an entangled structure made out of social individuals and connections between them. Vast scale online interpersonal organizations like Sina Weibo, Tencent Wechat and Facebook have pulled in a large number of clients as of late People might want to utilize interpersonal organizations to convey or diffuse data. For instance, an organization builds up another item, they need to promote the item in a specific informal community (Rath, 2015). The organization has a restricted spending so they can just give free example items to few clients. They trust that the underlying clients could infuence their companions to utilize the items, and their companions could impact theirs companions. Through the verbal impact, countless at last receive the products. Influence boost is an essential research issue in interpersonal organizations. It chooses an arrangement of k hubs as seeds with a specific end goal to boost the engendering of thoughts, conclusions and items.

The chapter has been organized as follows. Section 2 presents a brief literature review on various application aspects of social network and utility tools used in social network development and maintenance such as big data perspective, soft computing techniques etc. Section 3 presents various security issues and challenges in social network. At last section 4 concludes the chapter.

Complete Chapter List

Search this Book: