Securing Social Networks in Cyberspace  book cover
1st Edition

Securing Social Networks in Cyberspace




ISBN 9780367681739
Published October 11, 2021 by CRC Press
316 Pages 100 B/W Illustrations

FREE Standard Shipping
USD $110.00

Prices & shipping based on shipping country


Preview

Book Description

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book.

This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.

Table of Contents

Part I: Protection of Personal Information in Social Networks

1. User Awareness for Securing Social Networks

Abhijit Bhowmik, S. M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser

2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools

Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed

3. Enabling Location k-Anonymity in Social Networks

Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia Labrini

Part II: Securing Multimedia Contents

4. Automated Content Classification in Social Media Platforms

Thomas M. Chen

5. Steganographic Botnet C&C Channel Using Twitter

Nicholas Pantic and Mohammad Husain

6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter

P. R. Vishnu, Basant Agarwal, P. Vinod, K. A. Dhanya, and Alice Baroni

Part III: Cyberbullying, Cyberstalking, and Related Issues

7. Cyberbullying and Cyberstalking on Online Social Networks

Umit Can and Bilal Alatas

8. Cyberbullying Severity Detection Using Deep Learning Techniques – A Multi-Class Classification over Varied Class Balance Data

Sharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar

9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19

Mohammad Shadab Khan, Sharyar Wani, and Eima Fatima

Part IV: Other Issues for Securing Social Networks and Online Profiles

10. Profiling Online Users: Emerging Approaches and Challenges

Mohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed

11. Securing Mobile Social Networks

Robert Gordon

12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures

Md. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan

13. A Tutorial on Cross-Site Scripting Attack – Defense against Online Social Networks

Vassilis Papaspirou, Leandros Maglaras, and Mohamed Amine Ferrag

...
View More

Editor(s)

Biography

Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues.