2014
DOI: 10.1109/comst.2014.2321628
|View full text |Cite
|
Sign up to set email alerts
|

Online Social Networks: Threats and Solutions

Abstract: Many online social network (OSN) users are unaware of the numerous security risks that exist in these networks, including privacy violations, identity theft, and sexual harassment, just to name a few. According to recent studies, OSN users readily expose personal and private details about themselves, such as relationship status, date of birth, school name, email address, phone number, and even home address. This information, if put into the wrong hands, can be used to harm users both in the virtual world and i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
126
0
1

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 278 publications
(148 citation statements)
references
References 66 publications
1
126
0
1
Order By: Relevance
“…For the spam detection, the spam word dataset, URL blocking, keyword blocking is applied on rendered message. Then, the data mining or text classification algorithm is used to detect the overall spam [3] . [4] In this paper the techniques available for detection of spammers in Twitter have been presented along with their analysis and comparison.…”
Section: Spam Detection and Filtration Using Data Mining For Sociamentioning
confidence: 99%
“…For the spam detection, the spam word dataset, URL blocking, keyword blocking is applied on rendered message. Then, the data mining or text classification algorithm is used to detect the overall spam [3] . [4] In this paper the techniques available for detection of spammers in Twitter have been presented along with their analysis and comparison.…”
Section: Spam Detection and Filtration Using Data Mining For Sociamentioning
confidence: 99%
“…In 2014, Michael Fire et.al, [10] presented an overview of existing solutions that provide better protection, security and privacy for users. It offers simple-to-implement platforms for users.…”
Section: Related Workmentioning
confidence: 99%
“…Privacy breaches may result from the service provider, other users, or third party applications. Fire, Goldschmidt, & Elovici (2014) categorize threats into classic, modern, combined, and childrenoriented threats. Classic threats include malware, phishing attacks, spammers, crosssite scripting (XSS), and internet fraud.…”
Section: Related Work On Categorization Of Attacksmentioning
confidence: 99%