Yıl: 2018 Cilt: 7 Sayı: 2 Sayfa Aralığı: 60 - 66 Metin Dili: İngilizce İndeks Tarihi: 24-10-2020

Privacy Issues on Social Networks

Öz:
The privacy is a need for humanity since the creation of civilizations. In social networks the common point is thateach user has to create a profile to define his or her own identity. The profile description includes many items with privacysettings to tune their visibility degrees for only owner, friends, friends of friends and sometimes for public. After enrolmentstage, users extend their social connection graphs with accepted new friends and these graphs grow without the control ofindividual due to the new friends of friends. Hence, with high probability, the shared information of member is generallyavailable to public and can be retrieved by users around the world. This article is prepared to give an overview on the reasonsof privacy concerns and risks of SNs, and summarize the current and future possible solution directions for researchers andgovernments.
Anahtar Kelime:

Belge Türü: Makale Makale Türü: Araştırma Makalesi Erişim Türü: Erişime Açık
  • [1]. H. Hsiao-Ying; M. Bashir, "Is privacy a human right? An empirical examination in a global context," in Privacy, Security and Trust (PST), 13th Annual Conference on, vol., no., pp.77-84, 21-23 doi: 10.1109/PST.2015.7232957, July 2015.
  • [2]. A. Ho, A. Maiga, and E. Aimeur. “Privacy protection issues in social networking sites”, In 2009 IEEE/ACS International Conference on Computer Systems and Applications, pages 271–278, May 2009.
  • [3]. V. Tuunainen, O. Pitkänen, and M. Hovi, "Users’ Awareness of Privacy on Online Social Networking Sites – Case Facebook", BLED 2009 Proceedings. 42, http://aisel.aisnet.org/bled2009/42, 2009.
  • [4]. J. Min, and B. Kim, “How are people enticed to disclose personal information despite privacy concerns in social network sites? The calculus between benefit and cost”, JASIST, 66: 839–857. doi: 10.1002/asi.23206, 2015.
  • [5]. L. Fang and K. LeFevre. “Privacy wizards for social networking sites”, In Proceedings of the 19th international conference on World wide web (WWW '10). ACM, New York, NY, USA, 351-360. doi=10.1145/1772690.1772727 http://doi.acm.org/10.1145/1772690.1772727, 2010.
  • [6]. N. Talukder, M. Ouzzani, A. Elmagarmid, H. Elmeleegy, “Privometer: Privacy protection in social networks”, vol. 1, no. 2. VLDB Endowment, pp. 141– 150, 2010
  • [7]. Y. Wang, R.K. Nepali, and J. Nikolai. “Social network privacy measurement and simulation”, In Computing, Networking and Communications (ICNC), 2014 International Conference on, vol., no., pp.802-806, 3-6 doi: 10.1109/ICCNC.2014.6785440, Feb. 2014.
  • [8]. T. L. James, M. Warkentin, and S. E. Collignon. “A dual privacy decision model for online social networks”, Inf. Manage., 52(8):893–908, December 2015.
  • [9]. C. Dong, H. Jin, and B. Knijnenburg. “Predicting privacy behavior on online social networks” Ninth International AAAI Conference Web and Social Media, April 2015.
  • [10]. C. Dong, H. Jin, and B. P. Knijnenburg, “PPM: A Privacy Prediction Model for Online Social Networks”, In: Spiro E., Ahn YY. (eds) Social Informatics. SocInfo 2016. Lecture Notes in Computer Science, vol 10047. Springer, Cham, https://doi.org/10.1007/978-3-319-47874-6_28, 2016.
  • [11]. E. Aghasian, S. Garg, L. Gao, S. Yu, and J. Montgomery, “Scoring users’ privacy disclosure across multiple online social networks”, IEEE Access, 5:13118–13130, 2017.
  • [12]. A. Srivastava and G. Geethakumari. “Measuring privacy leaks in online social networks”, In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp 2095– 2100, Aug 2013.
  • [13]. D. Wang, X. Zeng, and J. A. Keane. “A simplified structure evolving method for Mamdani fuzzy system identification and its application to high-dimensional problems”, Information Sciences, 220(Supplement C):110 – 123. Online Fuzzy Machine Learning and Data Mining, 2013.
  • [14]. P.S. Bayerl and B. Akhgar. “Surveillance and falsification implications for open source intelligence investigations”, Commun. ACM 58, 8, 62-69. DOI=10.1145/2699410 http://doi.acm.org/10.1145/2699410, July 2015.
  • [15]. L. Schwittmann, C. Boelmann, M. Wander, and T. Weis, “SoNet -- Privacy and Replication in Federated Online Social Networks”, In Proceedings of the 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (ICDCSW '13). IEEE Computer Society, Washington, DC, USA, 51-57. DOI=10.1109/ICDCSW.2013.20 http://dx.doi.org/10.1109/ICDCSW.2013.20, 2013.
  • [16]. K.M. Deirdre and A.B. Kenneth. “What regulators can do to advance privacy through design”, Commun. ACM 56, 11, 20-22. DOI=10.1145/2527185 http://doi.acm.org/10.1145/2527185, November 2013.
  • [17]. Guide to the General Data Protection Regulation (GDPR), https://ico.org.uk/for-organisations/guide-tothe-general-data-protection-regulation-gdpr/ Latest Access Time for the website is 06 June 2018.
  • [18]. A. Karatas, S. Sahin, “A Review on Social Bot Detection Techniques and Research Directions”, in Proceedings of the 10th International Conference on Information Security and Cryptology (ISCTurkey 2017), Article No. 29, Ankara, Turkey, October 20- 21,2017, pp. 156- 161. Accessed on Oct. 30,2017[Online]
  • [19]. Y. Bao, C. Yi, Y. Xue, and Y. Dong. “A new rumor propagation model and control strategy on social networks”, In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM '13). ACM, New York, NY, USA, 1472-1473, DOI=http://dx.doi.org/10.1145/2492517.2492599, 2013.
  • [20]. E. Serrano, C. Á. Iglesias, and M. Garijo, “A Novel Agent-Based Rumor Spreading Model in Twitter”, In Proceedings of the 24th International Conference on World Wide Web (WWW '15 Companion). ACM, New York, NY, USA, 811-814. DOI: http://dx.doi.org/10.1145/2740908.2742466, 2015.
  • [21]. G. Cordasco, L. Gargano, A. A. Rescigno, and U. Vaccaro, “Brief Announcement: Active Information Spread in Networks”, In Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing (PODC '16). ACM, New York, NY, USA, 435-437. DOI: http://dx.doi.org/10.1145/2933057.2933069, 2016.
  • [22]. Chao Tong, Wenbo He, Jianwei Niu and Zhongyu Xie, “A novel information cascade model in online social networks”, Physica A: Statistical Mechanics and its Applications, Volume 444, p. 297-310. DOI:10.1016/j.physa.2015.10.026, 2015.
  • [23]. B. Sayin, S. Sahin, “A Novel Approach to Information Spreading Models for Social Networks”, IARIA, The Sixth International Conference on Data Analytics Conference 2017, ISBN: 978-1-61208-603- 3 Page 23-27, November 2017.
APA Koşal Şahin S (2018). Privacy Issues on Social Networks. , 60 - 66.
Chicago Koşal Şahin Serap Privacy Issues on Social Networks. (2018): 60 - 66.
MLA Koşal Şahin Serap Privacy Issues on Social Networks. , 2018, ss.60 - 66.
AMA Koşal Şahin S Privacy Issues on Social Networks. . 2018; 60 - 66.
Vancouver Koşal Şahin S Privacy Issues on Social Networks. . 2018; 60 - 66.
IEEE Koşal Şahin S "Privacy Issues on Social Networks." , ss.60 - 66, 2018.
ISNAD Koşal Şahin, Serap. "Privacy Issues on Social Networks". (2018), 60-66.
APA Koşal Şahin S (2018). Privacy Issues on Social Networks. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, 7(2), 60 - 66.
Chicago Koşal Şahin Serap Privacy Issues on Social Networks. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE 7, no.2 (2018): 60 - 66.
MLA Koşal Şahin Serap Privacy Issues on Social Networks. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, vol.7, no.2, 2018, ss.60 - 66.
AMA Koşal Şahin S Privacy Issues on Social Networks. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE. 2018; 7(2): 60 - 66.
Vancouver Koşal Şahin S Privacy Issues on Social Networks. INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE. 2018; 7(2): 60 - 66.
IEEE Koşal Şahin S "Privacy Issues on Social Networks." INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE, 7, ss.60 - 66, 2018.
ISNAD Koşal Şahin, Serap. "Privacy Issues on Social Networks". INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE 7/2 (2018), 60-66.