You are on page 1of 4

BAAO COMMUNITY COLLEGE

Baao, Camarines Sur


Email add: baaocommunitycollege@gmail.com
College of Education
S/Y 2022-2023

Title of the Issue: Privacy and Security


Title of the Article: Privacy and Security for Online Social Networks: Challenges and Opportunities
Sources: https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=+article+privacy+and+security&btnG=#d=gs_qabs&t=16632451725
29&u=%23p%3DosU47Haz168J
Author/s: Chi Zhang and Jinyuan Sun, University of Florida Xiaoyan Zhu,
Xidian University Yuguang Fang, University of Florida and Xidian University
Summary Narrative:
Online social networks (OSNs) such as Facebook, MySpace, and Twitter enable people
to stay in touch with their contacts, reconnect with old acquaintances, and establish new
relationships with other people based on shared features such as communities, hobbies,
interests, and overlaps in friendship circles. Recent years have seen unprecedented growth in
the application of OSNs, with about 300 OSN systems collecting information on more than
half a billion registered users. As a result, OSNs store a huge amount of possibly sensitive and
private information on users and their interactions. This information is usually private and
intended for the eyes of a specific audience only. However, the popularity of OSNs attracts
not only faithful users but parties with rather adverse interests as well. The diversification
and sophistication of purposes and usage patterns of OSNs inevitably introduce privacy
infringement risks to all OSN users because of information exchange and sharing on the
Internet. It is therefore not surprising that stories about privacy breaches by Facebook and
MySpace appear repeatedly in mainstream media. Regardless of the purpose of an OSN, one
of the main motivations for users to join an OSN, create a profile, and use different
applications offered by the OSN is the possibility to easily share information with selected
contacts or the public, and facilitate social interactions between the users of OSNs. Disclosing
personal information in OSNs is a double-edged sword. On one hand, information exposure is
usually a plus, even a must, if people want to participate in social communities. They believe
that more effective and flexible security mechanisms are therefore required for the safety of
OSN users as well as the continued thriving of OSNs. In this article it presents a general
framework for assessing the security and privacy of current and next-generation OSNs.
There are features of OSNs since the motivation of tis article is to provide the
advantages of OSNs without compromising privacy and security in OSNs, the desirable
features of traditional OSNs and their possible implementations need to be discussed first:
Main Functionalities of OSNs, An OSN is a digital representation of its users and their social
connections/relationships in the physical or virtual world, plus networking services for
messaging and socializing among its users. It provides a platform to: Allow users to construct
digital representations of themselves (usually known as user profiles) and articulate their
social connections with other users., Support the maintenance and enhancement of
preexisting social connections among users in the physical or virtual world., Help forge new
connections based on common interests, location, activities, and so on Based on the above
definition, an OSN should provide the following functionalities to facilitate users’ self-
representations and online social interactions. Personal Space Management, an OSN should
support a user to: Create/cancel an account, Create/edit user profile and upload/edit user
generated contents. Means of Communication, communicating with others is the central
feature offered by OSN services. There are several possible channels of communication
among users. First, one can leave public messages (e.g., blogging) in the form of texts, video,
audio, photos, and so on using personal space. Moreover, one can send private messages,
which are another form of asynchronous communication, as opposed to synchronous
communication such as instant messaging readily available in almost all OSNs. Global
Keyword Search (or Social Search) first means to find an unknown user is to conduct a global
keyword search. A successful search would produce for the accessing user the search listing
of a target user. A user may specify a search policy to allow only a subset of users to be able
to reach her search listing through a global name search. There are two paradigms of
implementing an OSN in the literature, client-server architecture (This traditional
architecture has the advantage of being straightforward and easy to implement, while
suffering from all the drawbacks of centralized systems) and peer-to-peer (P2P) architecture
(It adopts a decentralized architecture relying on cooperation among several independent
parties who are also users of the OSNs. Users’ personal spaces are stored and maintained
distributivity.). To understand the unique challenges of balancing security and privacy with
usability and sociability, we first review how the standard principles of network security,
including confidentiality, integrity, and availability, extend to OSNs. There are Privacy and
Security Requirements for OSNs: User’s identity anonymity, User’s personal space privacy
and User’s communication privacy. As mentioned earlier, inherent design conflicts exist
between some security and privacy goals and traditional design goals such as usability and
sociability of OSNs. Social Space Exploring vs. Privacy To support social search and traversal,
disclosing some information about users’ profiles and lists of contacts is inevitable. For social
search, obviously, more personal data must be disclosed to support more efficient and
accurate search in digital social space; thus, there is a trade-off between search capabilities
and privacy. Specifically, higher search efficiency also means higher likelihood of potential
privacy breaches. For social traversal, public display of social connections also affects OSN
users’ privacy. First, social contacts themselves represent sensitive, private information that
can be used.
In this article we have discussed the security and privacy design issues on online social
networks and pointed out a few research directions for mitigating the design conflicts
between the various design goals of OSNs. However, an ultimate solution will require experts
from the social science and network security communities, industry, regulatory bodies, and
all other relevant communities to collaboratively make decisions on both secure mechanisms
and policies. This article is intended to provide a starting point for developing effective secure
and privacy preserving OSNs. We hope that this work will motivate OSN researchers and
developers to move forward with more creative design of OSNs without compromising users’
data security and privacy.
What lesson have you learned?
We have learned that Online Social Network have grown exponential in the past
years, and it had been used as a major platform in any kind of transactions or conversations.
Talking about its Security and Privacy OSN seeks to widely understand the arising challenges
that might be a big threat also a chance of resolving significant issues for all users. Aside from
the challenges under OSN, opportunities may begin to its wide range, where promotes an
advance chance of success in dealing with online Platforms, many online forms may be used
to promote any significant purposes of user. Yet on the other hand users are very much in
need of protection through the of OSN in terms of their confidentiality, integrity, and their
availability.
We all know that privacy and security are important for our safety and right to control
our personal information, we need to know some online security that we can use to protect
our information. Also, we need to be careful with how much information we reveal online,
sharing address, phone number, birthday and other personal information can mean you are
at a greater risk of identity theft, stalking and harassment. Protecting privacy is key to
ensuring human dignity, safety, and self-determination. So, all we need to do is always
control posting some personal information online for our safety, not sharing password,
setting profile to private and not accepting friend requests from random people are good
standard practices.
What suggestions can you offer?
To avoid becoming a victim of any online crimes, we suggest purging unused cellular
apps and browser extensions. Purge any software program that you don't use regularly.
Having fewer accounts could cause you in a lot less danger, from cellular apps to browser
extensions. Once you cease the use of an app delete it, because even the apps that you have
forgotten about can remain vigorous with hidden features. As the year passed by, our world
is already in a digital world wherein technology exist everywhere. Technology brought both
positive and negative on people's lives. Some of the things that technology has been made
was the applications, websites, and the internet where make impossible things possible.
Since we are already in the digital world, it's expected that most of us already encountered
these applications such as Facebook and Messenger. These applications use some of our
important details such as our names, place we live and sometimes we didn't notice that we
are already over sharing. One of the negative impacts of getting bigger population in online
social networks is that it created people who had bad intentions towards other people. One
example of this is that they hack and use other people's information and then use that
information to create another account and use it to scam and other unnecessary things. In
this issue, there are things that we should always keep in mind. In terms of clicking link, be
cautious enough and don't click it immediately otherwise it's not suspicious or it comes from
the school etc. Keep the emails and phone numbers we used private. Use secure and long
passwords, not easy enough to guess and most importantly review permissions when
installing applications and websites that we use. It's still on us on how we should be safe on
surfing the net. Information that we share were sometimes visible to everyone so, be careful.

Submitted by: Bermas, MA. Cristina B.


Boaquena, Jenilyn
Bon, Gloria C.
Casano, Mary Grace A.
De Dios, Hazel Ann M.
Luzon, Clarivel O.
Olivares, Joyce A.
Raro, Abegail B.
Templonuevo, Regine
Dacara Rica Julea A.

You might also like