Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Security and privacy in social networks
Altshuler Y., Elovici Y., Cremers A., Aharony N., Pentland A., Springer Publishing Company, Incorporated, New York, NY, 2013. 259 pp. Type: Book (978-1-461441-38-0)
Date Reviewed: Apr 17 2013

Online social networking is emerging as a primary means of communication, especially among the young. The rapid growth of available social networking services and users does not always correspond to a common awareness of the implications for security, privacy, and safety. This book explores the security and privacy aspects of online social networks and services.

This requires the definition of a new language, inherited and fused from many different fields including theory of computation, the social sciences, the traditional security field, and network and system engineering. The social networking services considered in this book range from social interaction websites like Facebook, MySpace, and LinkedIn, to services for information dissemination like Twitter; cases where social interaction is associated with other content (for example, Flickr and Amazon) are also included. The book is a collection of thematic studies divided into three complementary parts.

The first part focuses on fundamental aspects of security and privacy in social networks. The problem of privacy is defined from an interdisciplinary point of view, including legal, social, and computer-related aspects. Then, the new concept of digital identity is analyzed and contextualized within the requirements of remote communications. A peer-to-peer encryption scheme is proposed as a possible solution for confidentiality, to protect the privacy of users. Finally, some examples of crowdsourcing are investigated to explain the different perceptions of ethical cases between the offline and online worlds.

The second part is dedicated to mathematical models that can be used to study social dynamics, to detect manipulation or attacks aiming to extract information about the social interactions in the real world and use them to gain financial advantage. Attackers hope to “steal the reality” of a social network by slowly acquiring implicit social information, while remaining undetected.

The third and final part of the book presents some specific cases regarding the unique features of security and privacy in social networks, linking the social dimension to existing privacy and security issues. The link reconstruction attack is presented as an accurate method to reconstruct the structure of an unknown social network. The authors present two interesting cases that analyze the degree of anonymity in the Bitcoin system.

I found this book interesting and stimulating. It offers expert insight. The central chapters require the reader to have a mathematical background, while a basic knowledge of security, computer science, and the social sciences will also help. All of the chapters in this book are well referenced. The collection is not intended for beginners and requires a certain degree of confidence in the topics analyzed. Consulting other works [1,2] may also be helpful.

Reviewer:  Diego Merani Review #: CR141143 (1307-0589)
1) Kizza, J. M. Ethical and social issues in the information age (4th ed.). Springer, London, UK, 2010.
2) Prell, C. Social network analysis: history, theory & methodology. SAGE, London, UK, 2012.
Bookmark and Share
 
Social Networking (H.3.4 ... )
 
 
Web-Based Interaction (H.5.3 ... )
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Social Networking": Date
Social computing and virtual communities
Zaphiris P., Ang C., Chapman & Hall/CRC, Boca Raton, FL, 2009.  303, Type: Book (978-1-420090-42-0)
Sep 13 2011
A visual analytics approach to dynamic social networks
Federico P., Aigner W., Miksch S., Windhager F., Zenk L.  i-KNOW 2011 (Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies, Graz, Austria, Sep 7-9, 2011)1-8, 2011. Type: Proceedings
Nov 4 2011
Secure collaborative social networks
Zhan J. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 40(6): 682-689, 2010. Type: Article
Feb 8 2012
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy