Security Issues in Social Media: Challenges and Solutions
##semicolon##
https://doi.org/10.25212/lfu.qzj.2.2.41##semicolon##
Privacy, Personally and business Information, Social Media, secure architecture, secure hash function, two-factor authentication.پوختە
The popularity of social networking becomes very important for the societies. It makes life easy and modified the traditional society (TS) to electronical society (ES). Thus, community by using of social networking in every day is more than usual and becomes part of our daily life and without doubt sharing with our life and all around human daily activity helped by Facebook and it is a new way of 21 century communicates. The average use of social media by a normal person is seven hours per day. Social media users share ideas, information and communicate with different people. This communication reveals a lot of information such as private and business information that makes it visible to anyone who wants to view it or it become cross information.
Cross information means seen and exchange both of users’ information. Subsequently, other people are intending to take
advantage of this information. They can send spam or steal identities to sell it or use it for other purposes. This paper introduces new architecture to protect users’ accounts that can be use in Facebook. We also introduce some techniques that can be used in any types of social media networking. In addition, our proposed system architecture is increasing the security issue by using of two-tier architecture (2TA) authentication especially enhances user privacy in social website. The new contribution of our proposed system will insure no fraud account or fake identity is created in the network related to the business, as well as, people related to this account, all data and information will be kept private and less spam attacks will be guaranteed. In order to evaluate the proposed architecture tests, some profiles of academic staff and employees in the college of engineering–Salahaddin University were inspected.
##plugins.generic.usageStats.downloads##
سەرچاوەکان
Das B., Sahoo J. (2012) “Social Networking Sites – A Critical Analysis of Its Impact on Personal and Social Life”, International Journal of Business and Social Science Vol. 2 No. 14. www.ijbssnet.com
Porter, J. (2008). “Designing for the Social Web”. Thousand Oaks, CA: New Riders Press
Wüest C.,(2010) “The Risks of Social Networking” Retrieved from https://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/t he_risks_of_social_networking.pdf
Boyd, d. and Ellison, N. B. (2007). “Social network sites: definition, history, and scholarship”. Journal of Computer-Mediated Communication, 13(1). Retrieved from http://jcmc.indiana. edu/vol13/issue1/ boyd. ellison.html
Kreutz, C. (2009). “The next billion – the rise of social network sites in developing countries”. Retrieved from http://www.web2fordev.net/component/content/article/1-latest-news/69-socialnetworks .
Johnston K., Chen M., Hauman M., (2013) “Use, Perception and Attitude of University Students Towards Facebook and Twitter” ,The Electronic Journal Information Systems Evaluation Volume 16 Issue 3 2013, (201-211) , ISSN 1566-6379 201 ©Academic Publishing International Ltd Reference this paper as: available online at www.ejise.com
Dinerman B.,( 2011)” Social networking and security risks”, GFI White Paper.
Hogben G.,(2007),”Security Issues and Recommendations for Online Social Networks”. ENISA, October 2007 E. Retrieved from http://www.ifap.ru/library/book227.pdf
Wyman B., Scrivens W., Hoffman P., Spitzner L.,(2013)” Social Networking Safely “Retrieved from http://www.securingthehuman.org
Kumar A., Kumar G., Rai A., Sinha S. (2013) “Social Networking Sites and Their Security Issues” International Journal of Scientific and Research Publications, Volume 3, Issue 4, April 2013 1 ISSN 2250- 3153 www.ijsrp.org.
Lessig, L. (2006). (2009).” 4 reasons why e-records are still a mess£. Federal Computer Week. Code 2.0. New York: Basic. Lipowicz, A. Retrieved from: http://www.fcw.com/Articles/2009/03/09/policy-emailrecords.aspx.
Hansen, D. L., Shneiderman, B., & Smith, M. A. (2011). “Analyzing social media networks with NodeXL: Insights from a connected world”. Burlington, MA: Morgan Kaufmann.
http://www.ebizmba.com/articles/social-networking-websites
Danielle S. (2013), “Moving on from Facebook Using Instagram to connect with undergraduates and engage in teaching and learning”
Lenhart A.,Madden M.,(2009), “Teens, Privacy and Online Social Networks ” . Retrieved from http://www.it.cornell.edu/policies/infoprivacy/definition.cfm
Lenhart A., Amanda B., Madden B., Mary M.. (2007). “Teens, privacy &online social networks”. Retrieved from http://www.pewinternet.org/Reports/2007/Teens-Privacy-and-Online-Social-Networks/1-
Summary-of-Findings.aspx
Gross, R. and Acquisti, A. (2005). “Information revelation and privacy in online social
networks”. Proceedings of WPES’05 (pp. 71–80). Alexandria, VA: ACM.
Naaman M., Boase J., Lai C.-H. 2010. “Is it really about me?: message content in social awareness
streams In CSCW”.
Hu Y., Manikonda L., Kambhampatihttp S., (2013) “ What We Instagram: A First Analysis of
Instagram Photo Content and User Types “.Retrieved from : //149.169.27.83/instagram-icwsm.pdf
Lewis J.,(2009) MI6 chief blows his cover as wife's Facebook account reveals family holidays, showbiz
friends and links to David Irving. Retrieved from http://www.dailymail.co.uk/news/article-1197562/MI6-
chief-blows-cover-wifes-Facebook-account-reveals-family-holidays-showbiz-friends-links-David-Irving.html
STALLINGS, W.(2002) “Cryptography and Network Security”. Prentice Hall.
Maloney-Krichmar, D., & Preece, J. (2005). “A multilevel analysis of sociability, usability and
community dynamics in an online health community”. Transactions on Human– Computer Interaction, 12(2),
–32.
##submission.downloads##
بڵاو کرایەوە
چۆنییەتی بەکارهێنانی سەرچاوە
ژمارە
بەش
##submission.license##
##submission.copyrightStatement##
##submission.license.cc.by-nc-sa4.footer##Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission