PRIVACY AND TRUST IN VIRTUALLY ON SOCIAL NETWORKING

INTRODUCTION
Social networking sites are a type of virtual community that has grown tremendously in popularity for over the past few years. Type of social networking Facebook LinkedIn MySpace Ning Friendster Plaxo

MAIN PURPOSE
 Communication

 Making Relationship

USERS’ CONTROLS OVER THE PRIVACY ON THEIR INFORMATION AND PRIVACY CONTROLS ON SOCIAL NETWORKING SITES.

This is one of the major concern on social networking services. People’s complaints about social networking sites indiscriminately distributing their personal data on the Web are unconvincing when they have already made an explicit choice to expose that data in a public space.

they publish their information. implying friends within the Facebook network • broadens access to all of a user’s friends.o With expectations that these services will respect user intentions.plus friends of their friends • makes the Object completely public Some Friends Only Friends Friends of Friends Everyone on Facebook . o Different social networking sites give users different rights for each data type. o Eg Facebook Only Me • provides complete privacy • permits an explicit list of people to access the Object • permits all friends to access the Object—of course.

The categorization of Friends. and Everyone is too coarse. .Although Facebook has modified their privacy setting but it still looks like the site provides control at the wrong level of granularity. but the ability to specify a list of individuals is too fine. Friends of Friends.

change. . and delete disclosed data. • It's less clear what rights we have for entrusted data. even if the social networking sites don't want us to. and far less clear for incidental data.• It's also clear that users should have different rights with respect to each data type. • We should be allowed to export.

TRUST IN THE SOCIAL NETWORKING SITES AND TRUST IN OTHER MEMBERS ON SOCIAL NETWORKING Facebook and MySpace will be an example as a study about comparison between Facebook and MySpace have been conducted and presented at Americas Conference on Information Systems (AMCIS) 2007 .

MySpace • MySpace members are more experience using the site to meet new people. • The ability to ignoring messages or blocking access minimizes the risk exploring online relationships. • This show that MySpace members have confidence in their capacity to evaluate others and true is not as necessary in the building of new relationships. . • In other word making new relationship development even though MySpace have weaker trust result in this study.

Sophos conducted an experiment to see how easy it can be to steal vital personal data from Facebook users by creating 2 fake accounts. this valuable information can be easily exploited . • In the hands of an identity thief.FACEBOOK • Facebook members are more willing to share identifying information. they are exposing to the identity thief • In late 2009. • RESULTS 46% of users accepted the friend requests even though the owners of the Facebook accounts are strangers for them. 89% of the friended users in their 20s reveal their full birthdate on their profile.

. then open them one by one.Best Practice on Security Recommended by Sophos For Facebook Users Adjust Facebook privacy settings to help protect your identity Read the Facebook guide to privacy Think carefully about who you allow to become your friend Show “limited friends” a cut-down version of your profile Disable options.

and picture of the product easily  The main problem is the users trust on this kind of marketing  Some users that they have been lied by those owner of the Facebook account that sell product such as clothes.This will give effect to others people or company to do this kind of marketing as people start to distrust this kind of marketing .  We can see many advertisements at the right side of the Facebook page.  Most of these advertisements are about online marketing on selling their products  Users of Facebook also create the accounts to sell their product which they update the new product. information of the product.TRUST IN ONLINE SELLING ON SOCIAL NETWORKING  In the grand scheme of online marketing.  . the catchphrase “People Trust People” is a foundational principle. watch. and others.

Ways to gain trust from users if making online marketing on social networking. • Having an active presence within social networks provide an ideal way for buyers and sellers to build genuine. and advocacy can grow. The seal shows online consumers that the site they are patronizing has gone through various steps to verify to the general public that they have a valid SSL and that consumers will be able to locate them if ever there are issues. . Shopper Approved social proof which brought us the proof in the form of testimonials and ratings (from 1-5) from previous consumers. • Get verification from Trust Guard One of their products provided to on-line businesses is their Security Verified Seal. personal relationships with each other from which trust. • Get verification from Shopper Approved. loyalty.

•Facebook “Like” Button As a conversion expert Charles Nicholls said that the impact of the Facebook "Like" button cannot be underestimated. As such. as opposed to an arbitrary Google algorithm. where the index is built based on mass popularity." said Nicholls. . It is becoming an "index of content on the web. its importance has implications not only where social media is concerned. but for search engine marketing as well.

FUTURE INTERNET .

Meaning  Future Internet is a summarizing term for worldwide research activities dedicated to the further development of the original internet  Internet has become essential for enabling data information and flow exchanges all over the world enabling in turn a wide range of applications and services.  Future Internet socio-economics studies the relationship between any sort of economic activity and the social life of users .

Advantages Communication • Communication will be faster and reliable. Information • Any kind of information on any topic under sun is available on the Internet. .

job seeking Entertainment • There are numerous things that can be found.Service • More service provided such as online banking. . Music. news can be found and shared on the Internet. hobbies.

or business deals that involves the transfer of information across the globe via Internet .Ecommerce • Ecommerce is the concept used for any type of commercial maneuvering.

Disadvantages  Theft of Personal information If you use the Internet. can be accessed by other culprits to make your problems worse. Such illegal activities can be very frustrating for you. address. credit card number etc. you may be facing grave danger as your personal information such as name. . and so instead of just ignoring it. you should make an effort to try and stop these activities so that using the Internet can become that much safer. Spamming: Spamming refers to sending unwanted e-mails in bulk. which provide no purpose and needlessly obstruct the entire system.

Pornography: This is perhaps the biggest threat related to your children’s healthy mental life. Computers attached to internet are more prone to virus attacks and they can end up into crashing your whole hard disk. causing you considerable headache. . A very serious issue concerning the Internet. There are thousands of pornographic sites on the Internet that can be easily found and can be a detrimental factor to letting children use the Internet. Virus threat Virus is nothing but a program which disrupts the normal functioning of your computer systems.

E-COMMERCE .

what  E-commerce is the buying and selling of goods and services on the Internet. the business-tobusiness exchange of data  E-Mail and fax and their use  Business-to-business buying and selling  The security of business transactions . sometimes gathered into a "virtual mall  Electronic Data Interchange (EDI).  E-commerce can be divided into:  E-tailing . especially the World Wide Web.sites with online catalogs.

with newsletters) .e-commerce E-tailing • sites with online catalogs. sometimes gathered into a "virtual mall EDI • Electronic Data Interchange • business-tobusiness exchange of data E-Mail & Fax • use as media for reaching prospects and established customers (for example.

E-Mail.Business-to-business buying and selling • Web provides not only a 24-hour-a-day showcase for their products but a quick way to reach the right people in a company for more information. with some companies attempting to use email and fax for unsolicited ads (usually viewed as online junk mail or spam) to consumers and other business prospects. and. Fax. encrypting communications. ensuring the privacy and effectiveness of transactions. Security of Business Transactions • ontrolling access to resources such as Web pages for registered or selected users. and Internet Telephony • Most of this is business-tobusiness. in general. .

Best practise User authentication Web server access * Ensure no update or write access * Customers must be identified through the use of a User ID and password Session security and timeouts * can be misused to gain access to a customer's account. Content management * no erroneous information Redundancy * improve the availability of the E-commercesupporting systems .

System and configuration file security • could result in modifications by unauthorized personnel .Privacy policy • Lack of a privacy policy may result in litigation Physical security • could result in unauthorized changes to the systems.

.

.What is internet banking?? Online banking or Internet banking provides a fast and convenient way of performing common and allows customers to conduct financial transactions on a secure website operated by their retail or virtual bank. a web browser and a registered account for Internet banking from your banking institution. If you have a computer with Internet access. The concept of Internet banking has thus become a revolution in the field of banking and finance. office or virtually anywhere else in the world. credit union or building society. you’ll be able to do your banking from the comforts of home.

Programmers working on banking data bases came up with ideas for online banking transactions. some time during the 1980's. 1983 . 1980 • .History!! concept • The concept of Internet banking has been simultaneously evolving with the development of the World Wide Web. launched the first Internet banking service in United Kingdom. the Nottingham Building Society. commonly abbreviated and refereed to as the NBS. • In 1983.

..Advantages…. *With the help of Internet banking many transactions can be executed by the account holder. *The account holder does not have to personally visit the bank. to transact business. People can expend the services sitting at home. are to be processed. the Internet banking facility proves to be very handy. *When small transactions like balance inquiry. etc. record of recent transaction.

advantages Bouncing a check accidentally should be a thing of the past because you can monitor your account online any time. . day or night. *This is all possible by simply going online to the banks website and logging into your account.Cont. see what checks have cleared and when and know when automatic deposits and payments are made. *You can track your balance daily.

a few cases of forgery have been reported in online banking. like "hackers" accessing your bank accounts. huge loses may have been incurred. which can hack information (user name and password) entered by a person for some transaction. people lose their money without knowing and by the time. * In such cases. *There are some fraud or proxy websites. and later misuse it.Disadvantages… *In addition to this. Security concerns. . they get the bill.

. disadvantages *Let's face it. Lack of trust *For the new users who have performed financial transactions for only a few times. many people still don't trust the internet. they may still have this doubt whether or not they did the right thing such as clicked the right button and so on. *They can only be comfortable once they print the transaction receipt and the transaction appeared on the bank statement.Cont.

they always use the most advanced security technology in protecting their websites. Security fraud . *They can't help but worry about this aspect what with news on fraudulent bank transactions that pop up every now and then. disadvantages *Many people shy away from internet banking because of the security threat. this should not be a problem as banks that provide internet banking services prioritize security above anything else.Cont. *Since they value their customers. *However.

To prevent online banking from remaining an expensive additional channel that does little to retain footloose customers.Suggestion. banks must act quickly The first and most obvious step they should take is to see to it that the basic problem fueling dissatisfaction has been addressed ..

suggestion After repairing this basic deficiency. which anchor customers to the institution . banks must ensure that their services are competitive Obviously. .Cont. savings and brokerage services. it should include checking.

PRIVACY AND TRUST IN VIRTUALLITY WHILE USING EMAIL .

 E-mail systems are commonly used due to : 1)simplicity 2)flexibility 3)low costs for their implementation and usage.  There are problems concerning the absence : 1)robust mechanism for sender authentication 2) poor confidentiality 3)integrity mechanisms for message delivery 4) lacking of a consistent reputation mechanism for users 5)e-mail servers.  This systems suffer problems caused by fragilities in the protocols involved in the communication. .

1. or in scanning received messages to find suspect content which are: • Black Lists: distributed RBL (Real-time Black hole Lists) servers keep lists of IP address from spam spreaders or sources. • Message Filters: these are programs that filter e-mails according to their contents. A variant of this approach is grey listing. THREATS TO E-MAIL SYSTEMS  The main techniques are based in trustful and non-trustful servers’ lists.Bayesian classification. this list is commonly managed through a web based acknowledging mechanism. using statistical techniques. . which can queried through DNS to verify the sender trustworthiness. • White Lists: each e-mail server can keep a list of trusted senders. in which the list of trusted senders is dynamically built and managed. header analysis. neural networks.

2)SPF (Sender Policy Framework). SENDER AUTHENTICATION  The first step in e-mail security is sender authentication. 3)SenderID 4)DKIM .  It aims to guarantee that the source of a message is surely known  There are manytechniques have been developed with this goal which are: 1)PGP (Pretty Good Privacy).2.

3. ARCHITECTURE  The system architecture use concepts of trust networks.MTAs). . anti-virus tools. anti-spam tools. and an authentication model to build a trust management system among e-mail servers (Mail Transport Agents .

.

.  • Sender authentication: implements a domain authentication method. like SPF or DKIM. • SMTP Server: responsible for messages reception. according to the messages received from them.  • Anti-spam and anti-virus: classifies messages legitimate or malicious.  • Trust management system: maintains trust information about outside servers. The filter results are used by the trust management system. it implements the SMTP protocol.