This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues and family; sharing and posting information; managing audio, video and photos; and all other aspects of using social media sites both professionally and personally. In the setting of Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. This book discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyber bullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats, will be considered in the book.
This book can be used as a reference item for easy understanding of complex Cybersecurity issues in Social Network or Social Networking Services. It would be beneficial for the academicians and graduate level researchers mainly. Also, general readers may find it beneficial in protecting their social media related profiles.
Table of Contents
Part I - Protection of Personal Information in Social Networks
Chapter 01 - User Awareness for Securing Social Networks
Chapter 02 - Privacy-preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools
Chapter 03 - Enabling Location k-Anonymity in Social Networks
Part II - Securing Multimedia Contents
Chapter 04 - Automated Content Classification in Social Media Platforms
Chapter 05 - Steganographic Botnet C&C Channel using Twitter
Chapter 06 - A Deep Learning Based Model for an Efficient Hate-Speech Detection in Twitter
Part III - Cyberbullying, Cyberstalking, and Related Issues
Chapter 07 - Cyberbullying and Cyberstalking on Online Social Networks
Chapter 08 - Cyberbullying Severity Detection using Deep Learning Techniques – A Multi-Class Classification Over Varied Class Balance Data
Chapter 09 - Cyberbullying Among Neurodiverse Learners During Online Teaching and Learning Amidst COVID-19
Part IV - Other Issues for Securing Social Networks and Online Profiles
Chapter 10 - Profiling Online Users: Emerging Approaches and Challenges
Chapter 11 - Securing Mobile Social Networks
Chapter 12 - Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures
Chapter 13 - A Tutorial on Cross Site Scripting Attack - Defense
Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues.