Privacy and Security for Virtual Communities and Social Networks

Privacy and Security for Virtual Communities and Social Networks

Georgios Michaelides, Gábor Hosszú
ISBN13: 9781609601003|ISBN10: 1609601009|EISBN13: 9781609601010
DOI: 10.4018/978-1-60960-100-3.ch325
Cite Chapter Cite Chapter

MLA

Michaelides, Georgios, and Gábor Hosszú. "Privacy and Security for Virtual Communities and Social Networks." Virtual Communities: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, IGI Global, 2011, pp. 1051-1062. https://doi.org/10.4018/978-1-60960-100-3.ch325

APA

Michaelides, G. & Hosszú, G. (2011). Privacy and Security for Virtual Communities and Social Networks. In I. Management Association (Ed.), Virtual Communities: Concepts, Methodologies, Tools and Applications (pp. 1051-1062). IGI Global. https://doi.org/10.4018/978-1-60960-100-3.ch325

Chicago

Michaelides, Georgios, and Gábor Hosszú. "Privacy and Security for Virtual Communities and Social Networks." In Virtual Communities: Concepts, Methodologies, Tools and Applications, edited by Information Resources Management Association, 1051-1062. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-100-3.ch325

Export Reference

Mendeley
Favorite

Abstract

The importance of the virtual communities’ privacy and security problems comes into prominence by the rapid development of online social networks. This article presents the multiple threats currently plaguing the virtual world, Internet privacy risks, and recommendations and countermeasures to avoid such problems. New generations of users feel comfortable publishing their personal information and narrating their lives. They are often unaware how vulnerable the data in their public profiles are, which a large audience daily accesses. A so-called digital friendship is built among them. Such commercial and social pressures have led to a number of privacy and security risks for social network members. The article presents the most important vulnerabilities and suggests protection methods and solutions that can be utilized according to the threat. Lastly, the authors introduce the concept of a privacy-friendly virtual community site, named CWIW, where privacy methods have been implemented for better user protection.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.