Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
20Activity
0 of .
Results for:
No results containing your search query
P. 1
Security and Privacy on Social Networks on the Internet

Security and Privacy on Social Networks on the Internet

Ratings: (0)|Views: 214|Likes:
Published by Bob Ferris
This paper describes the expansion of social networks to the Internet. The change is still on progress, so the report is about:
- an up-to-date overview about what these networks are
- how they will be used
- which consequences they have for their users
An explanation of used terminology will help to understand the scope of these social networks. Furthermore a critical view on several developments like:
- cyberbulling
- the habits of the providers of these portals in the aspect of data aggregation
- the role of secret services
will give detailed insight into this topic.
This paper describes the expansion of social networks to the Internet. The change is still on progress, so the report is about:
- an up-to-date overview about what these networks are
- how they will be used
- which consequences they have for their users
An explanation of used terminology will help to understand the scope of these social networks. Furthermore a critical view on several developments like:
- cyberbulling
- the habits of the providers of these portals in the aspect of data aggregation
- the role of secret services
will give detailed insight into this topic.

More info:

Published by: Bob Ferris on Mar 12, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/30/2010

pdf

text

original

 
ReportonSECURITY AND PRIVACY IN SOCIAL NETWORKS ON THE INTERNET
submitted toJames McCallumUniversity of Technology DresdenDresdenJanuary 20, 2008byThomas GänglerUniversity of Technology DresdenDepartment of Computer ScienceThis report contains information on the background of the aspects security and privacy in socialnetworks on the Internet. Furthermore, a categorisation of the representatives and a detaildescription in which way they will be used. At last, a introduction in field of semantic analysis closethe report topic.
 
ABSTRACT
This paper describes the expansion of social networks to the Internet. The change is still on pro-gress, so the report is about:
an up-to-date overview about what these networks are
how they will be used
which consequences they have for their usersAn explanation of used terminology will help to understand the scope of these social networks. Fur-thermore a critical view on several developments like:
cyberbulling 
the habits of the providers of these portals in the aspect of
data aggregatio
 
the role of secret serviceswill give detailed insight into this topic.
ii
 
TABLE OF CONTENTS
ABSTRACT..........................................................................................................................iiI. INTRODUCTION...............................................................................................................1II. SOCIAL NETWORK SITES.............................................................................................2
Definition......................................................................................................................................2Basic Types..................................................................................................................................2
Friend Social Network Sites .....................................................................................................2Media Social Network Sites......................................................................................................4Dating Sites...............................................................................................................................4
Related Types...............................................................................................................................4
Social Mapping..........................................................................................................................4Social Bookmarking..................................................................................................................5Micro Blogging..........................................................................................................................5Social Online Games................................................................................................................5
III. SECURITY AND PRIVACY.............................................................................................6
A new Openness..........................................................................................................................6The Consequence of this Openness..........................................................................................7
Fake Characters and Infiltration................................................................................................7Cyberbullying and Cyberstalking...............................................................................................7I Googled You............................................................................................................................7Alibi Clubs.................................................................................................................................8
Privacy Guidelines in Comparison............................................................................................8
History.......................................................................................................................................8Will They learn from their mistakes?.........................................................................................9
IV. MISSION CREEP..........................................................................................................10
Data Mining and Data Aggregation..........................................................................................10OpenSocial and the other way around....................................................................................11Privacy Survival Guide..............................................................................................................11
V. CONCLUSION...............................................................................................................12APPENDIX A: REFERENCES............................................................................................A
LIST OF FIGURES
Figure 1: Registered users of some very popular SNSs in million.......................................................2Figure 2: Visitors in million in one month of some very popular SNSs..............................................3Figure 3: Results of the field research in teenager's habits on SNSs....................................................6Figure 4: An illustration of Google is scanning all your activity in the Internet..................................8Figure 5: Mission creep illustrated.....................................................................................................10Figure 6: Connecting the entries.........................................................................................................10iii

Activity (20)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
Puneet Tiwari liked this
p12_miller7777 liked this
Sahil Shein liked this
jvalenc9 liked this
Vanessa Bundhoo liked this
Shiva Adhikari liked this
pcreich liked this
pcreich liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->