Reference Hub6
Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks

Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks

Sanjeev Rao, Anil Kumar Verma, Tarunpreet Bhatia
Copyright: © 2021 |Pages: 17
ISBN13: 9781799857280|ISBN10: 179985728X|EISBN13: 9781799857297
DOI: 10.4018/978-1-7998-5728-0.ch012
Cite Chapter Cite Chapter

MLA

Rao, Sanjeev, et al. "Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks." Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, IGI Global, 2021, pp. 219-235. https://doi.org/10.4018/978-1-7998-5728-0.ch012

APA

Rao, S., Verma, A. K., & Bhatia, T. (2021). Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks. In M. Cruz-Cunha & N. Mateus-Coelho (Eds.), Handbook of Research on Cyber Crime and Information Privacy (pp. 219-235). IGI Global. https://doi.org/10.4018/978-1-7998-5728-0.ch012

Chicago

Rao, Sanjeev, Anil Kumar Verma, and Tarunpreet Bhatia. "Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks." In Handbook of Research on Cyber Crime and Information Privacy, edited by Maria Manuela Cruz-Cunha and Nuno Mateus-Coelho, 219-235. Hershey, PA: IGI Global, 2021. https://doi.org/10.4018/978-1-7998-5728-0.ch012

Export Reference

Mendeley
Favorite

Abstract

Online social networks (OSNs) are renowned powerful web tools that allow worldwide users to connect with their friends, families, professional groups, and social circle through social interaction for sharing common interests. With the proliferation, ease, and efficacy of OSNs, these are becoming an essential tool for communication. But many OSN users innocently uncover their personal information such as their home address, phone numbers, email id, etc. that can be used by the malicious user to perform various kind for cyber-crimes like cyber-bullying, spamming, click-jacking, identity theft, phishing, distrust, fake profiles, spreading malicious content, etc. This chapter presents a review of various privacy and security threats/attacks associated with OSN users and recommended combating techniques based on data-mining and machine learning algorithms. Also, the future directions for upcoming researchers in this field are suggested.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.