Title :
Trust and Privacy Exploitation in Online Social Networks
Author :
Wong, Kai-Kit ; Wong, Alexander ; Yeung, A. ; Wei Fan ; Su-Kit Tang
Author_Institution :
Macao Polytech. Inst., Macao, China
Abstract :
Online social networks have been typically created for convenience--so they haven´t been built from the ground up with security in mind. They often have confusing privacy settings and are susceptible to various kinds of attacks that exploit users´ trust and privacy. In this article, the authors discuss security pitfalls in today´s social networks, briefly introducing common attack methods. They implemented a proof-of-concept Facebook app, which is actually a harmless malware that uses common attack methods to demonstrate the vulnerability of online social networks. Although today´s online social networks commonly offer users a variety of security settings, users tend to trust the information obtained from online social networks regardless of the settings. This kind of user mentality can be more crucial than technical aspects in determining the level of security in online social networks.
Keywords :
data privacy; invasive software; social networking (online); trusted computing; Facebook app; harmless malware; online social networks; privacy exploitation; trust exploitation; Computer security; Facebook; Games; Information networks; Malware; Mobile communication; Privacy; Social network services; Trust management; Web and Internet services; Internet/Web technologies; information network; mobile; networking; privacy; security;
Journal_Title :
IT Professional
DOI :
10.1109/MITP.2014.79