4,098 research outputs found

    Online Child Sex Solicitation: Exploring the Feasibility of a Research 'Sting'

    Get PDF
    A small scale test of the integrity of Internet Web 2.0 social network sites was undertaken over several weeks in 2007. The fictional identities of four female underage children where posted on three network sites and later introduced to relay chat forums in order to explore the impact of apparent vulnerability on potential selection of Internet victims. Only one of the three social network sites in the study recognised that the postings violated child protection policies and subsequently closed down the underage postings. Two basic identities were created: one that engendered a needy and vulnerable characterisation of a child while the other identity was created to represent a happy and attached child character. The number of contacts and suspicious contacts were monitored to test assumptions about child ‘vulnerability’ and risks of unwanted sexual solicitations. The characters created also included either an avatar and/or contact details. These variants of the experiment showed that the inclusion of an image or access details increased the likelihood of contacts, including suspicious contact regardless of ‘vulnerability’. This small experiment noted that although vulnerable children with additional cues maybe at more risk all children who posted details about themselves on social network sites faced the risk of contact by predators. The need for further research and better means of regulating such sites was suggested

    A Facebook event collector framework for profile monitoring purposes

    Get PDF
    Social networks have recently emerged to become vital tools for information and content dissemination among connections. Indeed, the immense increase of number of users of Facebook made it rise to become the largest existing social network with more than 1.2 billion active users. However, these numbers also rose the attention of hackers and attackers who aim at propagating malware and viruses for obtaining confidential information regarding social network users. In this manner, it is crucial that each Facebook user is able to easily access, control and analyse the information shared on the corresponding profile so that profile usage deviations can be more efficiently detected. However, despite the fact that Facebook allows an analysis of all user actions through the Timeline Review, this information is not comprehensively organized and there is no statistical analysis of the user generated data. In this paper, we propose a novel framework comprising a Facebook event collector, which by being provided with an authentication token for a user profile obtained through a Facebook application developed for this purpose, collects all the corresponding posted information and stores it in a relational database for \textit{a posteriori} analysis. Through the graphical interface of the developed application, users can access all stored information in a comprehensible manner, according to the type of event, thus facilitating the analysis of user behaviour. By storing each event with the corresponding timestamp, we are able to perform an efficient and comprehensive analysis of all posted contents and compute statistical models over the obtained data. In this manner, we can create a notion of normal usage profile and detect possible deviations which may be indicative of a compromised user account

    Fake Profile Identification on Online Social Networks

    Get PDF
    Online social networks are web-based applications that allow user to communicate and share knowledge and information. The number of users who make use of these platforms are experiencing rapid growth both in profile creation and social interaction. However, intruders and malicious attackers have found their way into the networks, using fake profiles, thus exposing user to serious security and privacy problem.  Every user in the online social network should verify and authenticate their identities, with the other users as they interact. However, currently verification of user’s profiles and identities is faced with challenges, to the extent that a user may represent their identity with many profiles without any effective method of identity verification. As a result of this vulnerability, attackers create fake profiles which they use in attacking the online social system. In addition, online social networks use a logically centered architecture, where their control and management are under a service; provider, who must be entrusted with the security of data and communication traces; this further increases the vulnerability to attacks and online threats. In this paper, we demonstrate the causes and effects of fake profiles on online social networks, and then provide a review of the state-of-the-art mechanism for identifying and mitigating fake profiles on online social networks. Keywords: online social networks, fake profiles, sybil attack, fake account

    False News On Social Media: A Data-Driven Survey

    Full text link
    In the past few years, the research community has dedicated growing interest to the issue of false news circulating on social networks. The widespread attention on detecting and characterizing false news has been motivated by considerable backlashes of this threat against the real world. As a matter of fact, social media platforms exhibit peculiar characteristics, with respect to traditional news outlets, which have been particularly favorable to the proliferation of deceptive information. They also present unique challenges for all kind of potential interventions on the subject. As this issue becomes of global concern, it is also gaining more attention in academia. The aim of this survey is to offer a comprehensive study on the recent advances in terms of detection, characterization and mitigation of false news that propagate on social media, as well as the challenges and the open questions that await future research on the field. We use a data-driven approach, focusing on a classification of the features that are used in each study to characterize false information and on the datasets used for instructing classification methods. At the end of the survey, we highlight emerging approaches that look most promising for addressing false news
    • …
    corecore