Skip to main content

Optimal Information Security Investment in Modern Social Networking

  • Conference paper
  • First Online:
Complex Networks VIII (CompleNet 2017)

Part of the book series: Springer Proceedings in Complexity ((SPCOM))

Included in the following conference series:

Abstract

For further clarification of methodological issues of the social network’s information security we stratified the systems that support human relations into three components of different nature: computer, communication and social ones. A security model for a network component is developed using consideration of security for individual nodes . Modeling of attacks on networks in whole is analyzed taking into account specification of network security level. The results for real computer, communication and social entities supported that for a network attacked intentionally it is better off allocating the investment proportionally to degree centralities of the nodes rather than uniformely. The analysis further hints that to make investment justifiable to protect a network, its proprietor should spend lesser than to reach approximately 0.4 of network security level.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediat. Commun. 13, 210230 (2008)

    Google Scholar 

  2. Butts, C.T.: The complexity of social networks: theoretical and empirical findings. Social Netw. 23(1), 3172 (2001)

    Article  Google Scholar 

  3. Basim, M., Menezes, R.: The role of human relations and interactions in designing memory-related models for sensor networks. Sens. Transducers 199(4), 42–51 (2016)

    Google Scholar 

  4. Grabowicz, P.A., Ramasco, J.J., Gonalves, B., Eguiluz, V.M.: Entangling mobility and interactions in social media. PLoS One 9, E92196 (2014)

    Article  ADS  Google Scholar 

  5. Szell, M., Sinatra, R., Petri, G., Thurner, S., Latora, V.: Understanding mobility in a social petri dish. Sci. Reports 2, 457 (2012)

    ADS  Google Scholar 

  6. Barabsi, A.-L., Albert, R., Jeong, H.: Mean-field theory for scale-free random networks. Physica A 272, 173187 (1999)

    Google Scholar 

  7. Kivela, M., Arenas, A., Barthelemy, M., et al.: Multilayer networks. J. Complex Netw. 2(3), 203271 (2014)

    Google Scholar 

  8. Omodei, E., De Domenico, M., Arenas, A.: Evaluating the impact of interdisciplinary research: a multilayer network approach. Netw. Sci. 1, 12 (2016)

    Article  Google Scholar 

  9. Chen, Y.-Z., Huang, Z.-G., Zhang, H.-F., et al.: Extreme events in multilayer, interdependent complex networks and control. Sci. Reports 5, 17277 (2015)

    Article  ADS  Google Scholar 

  10. Wellman, B.: Computer networks as social networks. Science 293, 2031–2034 (2001)

    Article  ADS  Google Scholar 

  11. Landon, B.E., Keating, N.L., Barnett, M.L., et al.: Variation in patient-sharing networks of physicians across the United States. Jama 308(3), 265–273 (2012)

    Article  Google Scholar 

  12. Romero, D.M., Uzzi, B., Kleinberg, J.: Social Networks Under Stress WWW 2016, April 1115, 2016, Montral, Qubec, Canada. ACM 978-1-4503-4143-1/16/04 (2016)

    Google Scholar 

  13. Herrera, J.L., Srinivasan, R., Brownstein, J.S., et al.: Disease surveillance on complex social networks. PLoS Comput. Biol. 12(7), e1004928 (2016)

    Google Scholar 

  14. Ashurova, Z., Myeong, S., Tikhomirov, A., et al.: Comprehensive mega network (CMN) platform: Korea MTS governance for CIS case study. In: Berestneva, O., Tikhomirov, A., Trufanov, A. (eds.) ITSMSSM 2016: Information Technologies in Science, Management, Social Sphere and Medicine Tomsk, May 2016, pp. 266–269. Atlantis Press (2016)

    Google Scholar 

  15. Regan, E.R.: Networks: Structure and Dynamics. Beth Israel Deaconess Medical Center, Department of Medicine, Boston (2002). http://regan.med.harvard.edu/Teaching/CVBR/Ravasz_Networks.pdf

  16. Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438457 (2002)

    Article  Google Scholar 

  17. Huang, D., Behara, R., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decision Support Syst. 61, 1–11 (2014)

    Article  Google Scholar 

  18. Helbing, D.: Globally networked risks and how to respond. Nature 497, 5159 (2013)

    Article  Google Scholar 

  19. Cox Jr., L.A.: Some limitations of risk = threat? Vulnerability? Consequence for risk analysis of terrorist attacks. Risk Anal. 28(6), 1749–1761 (2008)

    Article  Google Scholar 

  20. Plum, M.M., Phillips, J., McCabe, P.H., et al.: Novel threat-risk index using probabilistic risk assessment and human reliability analysis. Report No. INEEL/EXT-03-01117, Idaho National Engineering and Environmental Laboratory, Idaho Falls, Idaho (2004). http://inldigitallibrary.inl.gov/sti/2535260.pdf

  21. Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1), 1–40 (2007)

    Article  Google Scholar 

  22. Chaintreau, A., Hui, P., Crowcroft, J., et al.: Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mobile Comput. 6(6), 606–620 (2007)

    Google Scholar 

  23. Viswanath, B., Mislove, A., Cha, N., Gummadi, K.P.: On the evolution of user interaction in Facebook. In: WOSN09: Proceedings of Workshop on Online Social Networks, August 17, 2009, Barcelona, Spain (2009). http://www.mpi-sws.org/gummadi/papers/wosn23-viswanath.pdf

  24. Gleiser, P.M., Danon, L.: Community structure in jazz. Adv. Complex Syst. 6(4), 565–573 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Andrey Trufanov .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Trufanov, A., Kinash, N., Tikhomirov, A., Berestneva, O., Rossodivita, A. (2017). Optimal Information Security Investment in Modern Social Networking. In: Gonçalves, B., Menezes, R., Sinatra, R., Zlatic, V. (eds) Complex Networks VIII. CompleNet 2017. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-319-54241-6_15

Download citation

Publish with us

Policies and ethics