2021
DOI: 10.21303/2461-4262.2021.001615
|View full text |Cite
|
Sign up to set email alerts
|

Modeling the Protection of Personal Data From Trust and the Amount of Information on Social Networks

Abstract: The article analyzes the parameters of social networks. The analysis is performed to identify critical threats. Threats may lead to leakage or damage to personal data. The complexity of this issue lies in the ever-increasing volume of data. Analysts note that the main causes of incidents in Internet resources are related to the action of the human factor, the mass hacking of IoT devices and cloud services. This problem is especially exacerbated by the strengthening of the digital humanistic nature of education… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
4
4

Relationship

3
5

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 16 publications
0
11
0
Order By: Relevance
“…To determine the relationship between the "prey" and the "predator," the threat classifier and expert assessment steps proposed in [25] and presented in Fig. 2, 3 are used.…”
Section: Research Materials and Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…To determine the relationship between the "prey" and the "predator," the threat classifier and expert assessment steps proposed in [25] and presented in Fig. 2, 3 are used.…”
Section: Research Materials and Methodsmentioning
confidence: 99%
“…In [25], it is proposed to use the Lotka-Volterra model to assess the dependence of personal data protection on the amount of information in the system and trust in social networks. As a result of research, the authors proved that the dependence of personal data protection on trust is proportional with other protection parameters unchanged.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…To assess the current state of the security level and individual security indicators, many different security indicators are used [13,14]. However, most of them are far from the results described above.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…The work [13,15,27] is devoted to solving the problem of ensuring functional stability on the basis of Petri nets. In the works [14][15][16][17]24] network technologies of visual information transmission and development of information technology of task distribution for network systems using the simulation environment GRASS are considered. The methods mentioned in these works also use the mechanisms of network restructuring during anomalous overloads.…”
Section: Literature Reviewmentioning
confidence: 99%