{"title":"社会应用中的信息安全问题及解决途径","authors":"Mamata Rath","doi":"10.4018/978-1-5225-7879-6.CH009","DOIUrl":null,"url":null,"abstract":"A social network is a portrayal of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. This chapter exhibits an exhaustive review of various security and protection issues in social networks that directly or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused on that appear because of the sharing of interactive media content inside a social networking site. Additionally, the chapter also reports current cutting-edge guard arrangements that can shield social network clients from these dangers.","PeriodicalId":173264,"journal":{"name":"Advances in Systems Analysis, Software Engineering, and High Performance Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Information Security Problem and Solution Approaches in Social Applications\",\"authors\":\"Mamata Rath\",\"doi\":\"10.4018/978-1-5225-7879-6.CH009\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A social network is a portrayal of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. This chapter exhibits an exhaustive review of various security and protection issues in social networks that directly or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused on that appear because of the sharing of interactive media content inside a social networking site. Additionally, the chapter also reports current cutting-edge guard arrangements that can shield social network clients from these dangers.\",\"PeriodicalId\":173264,\"journal\":{\"name\":\"Advances in Systems Analysis, Software Engineering, and High Performance Computing\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Advances in Systems Analysis, Software Engineering, and High Performance Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.4018/978-1-5225-7879-6.CH009\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in Systems Analysis, Software Engineering, and High Performance Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.4018/978-1-5225-7879-6.CH009","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Information Security Problem and Solution Approaches in Social Applications
A social network is a portrayal of the social structure between actors, mostly individuals or organizations. It indicates the ways in which they are connected through various social familiarities ranging from casual acquaintance to close familiar bonds. This chapter exhibits an exhaustive review of various security and protection issues in social networks that directly or indirectly affect the individual member of the network. Furthermore, different threats in social networks have been focused on that appear because of the sharing of interactive media content inside a social networking site. Additionally, the chapter also reports current cutting-edge guard arrangements that can shield social network clients from these dangers.