Security Issues in Social Media: Challenges and Solutions

توێژەران

  • Mardin A. Anwer Software and Informatics department, College of Engineering, Salahaddin University - Iraq
  • Rina Dinkha Zarro Software and Informatics department, College of Engineering, Salahaddin University - Iraq
  • Kamaran HamaAli Faraj HamaAliFaraj Computer department, College of Science, University of Cihan-Sulamani – KRG Computer department, College of Science, University of Sulamani-KRG

##semicolon##

https://doi.org/10.25212/lfu.qzj.2.2.41

##semicolon##

Privacy, Personally and business Information, Social Media, secure architecture, secure hash function, two-factor authentication.

پوختە

The popularity of social networking becomes very important for the societies. It makes life easy and modified the traditional society (TS) to electronical society (ES). Thus, community by using of social networking in every day is more than usual and becomes part of our daily life and without doubt sharing with our life and all around human daily activity helped by Facebook and it is a new way of 21 century communicates. The average use of social media by a normal person is seven hours per day. Social media users share ideas, information and communicate with different people. This communication reveals a lot of information such as private and business information that makes it visible to anyone who wants to view it or it become cross information.
Cross information means seen and exchange both of users’ information. Subsequently, other people are intending to take
advantage of this information. They can send spam or steal identities to sell it or use it for other purposes. This paper introduces new architecture to protect users’ accounts that can be use in Facebook. We also introduce some techniques that can be used in any types of social media networking. In addition, our proposed system architecture is increasing the security issue by using of two-tier architecture (2TA) authentication especially enhances user privacy in social website. The new contribution of our proposed system will insure no fraud account or fake identity is created in the network related to the business, as well as, people related to this account, all data and information will be kept private and less spam attacks will be guaranteed. In order to evaluate the proposed architecture tests, some profiles of academic staff and employees in the college of engineering–Salahaddin University were inspected. 

##plugins.generic.usageStats.downloads##

##plugins.generic.usageStats.noStats##

سەرچاوەکان

Das B., Sahoo J. (2012) “Social Networking Sites – A Critical Analysis of Its Impact on Personal and Social Life”, International Journal of Business and Social Science Vol. 2 No. 14. www.ijbssnet.com

Porter, J. (2008). “Designing for the Social Web”. Thousand Oaks, CA: New Riders Press

Wüest C.,(2010) “The Risks of Social Networking” Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/t he_risks_of_social_networking.pdf

Boyd, d. and Ellison, N. B. (2007). “Social network sites: definition, history, and scholarship”. Journal of Computer-Mediated Communication, 13(1). Retrieved from http://jcmc.indiana. edu/vol13/issue1/ boyd. ellison.html

Kreutz, C. (2009). “The next billion – the rise of social network sites in developing countries”. Retrieved from http://www.web2fordev.net/component/content/article/1-latest-news/69-socialnetworks .

Johnston K., Chen M., Hauman M., (2013) “Use, Perception and Attitude of University Students Towards Facebook and Twitter” ,The Electronic Journal Information Systems Evaluation Volume 16 Issue 3 2013, (201-211) , ISSN 1566-6379 201 ©Academic Publishing International Ltd Reference this paper as: available online at www.ejise.com

Dinerman B.,( 2011)” Social networking and security risks”, GFI White Paper.

Hogben G.,(2007),”Security Issues and Recommendations for Online Social Networks”. ENISA, October 2007 E. Retrieved from http://www.ifap.ru/library/book227.pdf

Wyman B., Scrivens W., Hoffman P., Spitzner L.,(2013)” Social Networking Safely “Retrieved from http://www.securingthehuman.org

Kumar A., Kumar G., Rai A., Sinha S. (2013) “Social Networking Sites and Their Security Issues” International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 ISSN 2250- 3153 www.ijsrp.org.

Lessig, L. (2006). (2009).” 4 reasons why e-records are still a mess£. Federal Computer Week. Code 2.0. New York: Basic. Lipowicz, A. Retrieved from: http://www.fcw.com/Articles/2009/03/09/policy-emailrecords.aspx.

Hansen, D. L., Shneiderman, B., & Smith, M. A. (2011). “Analyzing social media networks with NodeXL: Insights from a connected world”. Burlington, MA: Morgan Kaufmann.

http://www.ebizmba.com/articles/social-networking-websites

Danielle S. (2013), “Moving on from Facebook Using Instagram to connect with undergraduates and engage in teaching and learning”

Lenhart A.,Madden M.,(2009), “Teens, Privacy and Online Social Networks ” . Retrieved from http://www.it.cornell.edu/policies/infoprivacy/definition.cfm

Lenhart A., Amanda B., Madden B., Mary M.. (2007). “Teens, privacy &online social networks”. Retrieved from http://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks/1-

Summary-of-Findings.aspx

Gross, R. and Acquisti, A. (2005). “Information revelation and privacy in online social

networks”. Proceedings of WPES’05 (pp. 71–80). Alexandria, VA: ACM.

Naaman M., Boase J., Lai C.-H. 2010. “Is it really about me?: message content in social awareness

streams In CSCW”.

Hu Y., Manikonda L., Kambhampatihttp S., (2013) “ What We Instagram: A First Analysis of

Instagram Photo Content and User Types “.Retrieved from : //149.169.27.83/instagram-icwsm.pdf

Lewis J.,(2009) MI6 chief blows his cover as wife's Facebook account reveals family holidays, showbiz

friends and links to David Irving. Retrieved from http://www.dailymail.co.uk/news/article-1197562/MI6-

chief-blows-cover-wifes-Facebook-account-reveals-family-holidays-showbiz-friends-links-David-Irving.html

STALLINGS, W.(2002) “Cryptography and Network Security”. Prentice Hall.

Maloney-Krichmar, D., & Preece, J. (2005). “A multilevel analysis of sociability, usability and

community dynamics in an online health community”. Transactions on Human– Computer Interaction, 12(2),

–32.

##submission.downloads##

بڵاو کرایەوە

2021-01-24

ژمارە

بەش

Articles

ئەو توێژینەوانەی ئەم نوسەرە کە زۆرترین جار خوێندراونەتەوە.