Abstract
For further clarification of methodological issues of the social network’s information security we stratified the systems that support human relations into three components of different nature: computer, communication and social ones. A security model for a network component is developed using consideration of security for individual nodes . Modeling of attacks on networks in whole is analyzed taking into account specification of network security level. The results for real computer, communication and social entities supported that for a network attacked intentionally it is better off allocating the investment proportionally to degree centralities of the nodes rather than uniformely. The analysis further hints that to make investment justifiable to protect a network, its proprietor should spend lesser than to reach approximately 0.4 of network security level.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boyd, D.M., Ellison, N.B.: Social network sites: definition, history, and scholarship. J. Comput.-Mediat. Commun. 13, 210230 (2008)
Butts, C.T.: The complexity of social networks: theoretical and empirical findings. Social Netw. 23(1), 3172 (2001)
Basim, M., Menezes, R.: The role of human relations and interactions in designing memory-related models for sensor networks. Sens. Transducers 199(4), 42–51 (2016)
Grabowicz, P.A., Ramasco, J.J., Gonalves, B., Eguiluz, V.M.: Entangling mobility and interactions in social media. PLoS One 9, E92196 (2014)
Szell, M., Sinatra, R., Petri, G., Thurner, S., Latora, V.: Understanding mobility in a social petri dish. Sci. Reports 2, 457 (2012)
Barabsi, A.-L., Albert, R., Jeong, H.: Mean-field theory for scale-free random networks. Physica A 272, 173187 (1999)
Kivela, M., Arenas, A., Barthelemy, M., et al.: Multilayer networks. J. Complex Netw. 2(3), 203271 (2014)
Omodei, E., De Domenico, M., Arenas, A.: Evaluating the impact of interdisciplinary research: a multilayer network approach. Netw. Sci. 1, 12 (2016)
Chen, Y.-Z., Huang, Z.-G., Zhang, H.-F., et al.: Extreme events in multilayer, interdependent complex networks and control. Sci. Reports 5, 17277 (2015)
Wellman, B.: Computer networks as social networks. Science 293, 2031–2034 (2001)
Landon, B.E., Keating, N.L., Barnett, M.L., et al.: Variation in patient-sharing networks of physicians across the United States. Jama 308(3), 265–273 (2012)
Romero, D.M., Uzzi, B., Kleinberg, J.: Social Networks Under Stress WWW 2016, April 1115, 2016, Montral, Qubec, Canada. ACM 978-1-4503-4143-1/16/04 (2016)
Herrera, J.L., Srinivasan, R., Brownstein, J.S., et al.: Disease surveillance on complex social networks. PLoS Comput. Biol. 12(7), e1004928 (2016)
Ashurova, Z., Myeong, S., Tikhomirov, A., et al.: Comprehensive mega network (CMN) platform: Korea MTS governance for CIS case study. In: Berestneva, O., Tikhomirov, A., Trufanov, A. (eds.) ITSMSSM 2016: Information Technologies in Science, Management, Social Sphere and Medicine Tomsk, May 2016, pp. 266–269. Atlantis Press (2016)
Regan, E.R.: Networks: Structure and Dynamics. Beth Israel Deaconess Medical Center, Department of Medicine, Boston (2002). http://regan.med.harvard.edu/Teaching/CVBR/Ravasz_Networks.pdf
Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5(4), 438457 (2002)
Huang, D., Behara, R., Goo, J.: Optimal information security investment in a healthcare information exchange: an economic analysis. Decision Support Syst. 61, 1–11 (2014)
Helbing, D.: Globally networked risks and how to respond. Nature 497, 5159 (2013)
Cox Jr., L.A.: Some limitations of risk = threat? Vulnerability? Consequence for risk analysis of terrorist attacks. Risk Anal. 28(6), 1749–1761 (2008)
Plum, M.M., Phillips, J., McCabe, P.H., et al.: Novel threat-risk index using probabilistic risk assessment and human reliability analysis. Report No. INEEL/EXT-03-01117, Idaho National Engineering and Environmental Laboratory, Idaho Falls, Idaho (2004). http://inldigitallibrary.inl.gov/sti/2535260.pdf
Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Discov. Data 1(1), 1–40 (2007)
Chaintreau, A., Hui, P., Crowcroft, J., et al.: Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mobile Comput. 6(6), 606–620 (2007)
Viswanath, B., Mislove, A., Cha, N., Gummadi, K.P.: On the evolution of user interaction in Facebook. In: WOSN09: Proceedings of Workshop on Online Social Networks, August 17, 2009, Barcelona, Spain (2009). http://www.mpi-sws.org/gummadi/papers/wosn23-viswanath.pdf
Gleiser, P.M., Danon, L.: Community structure in jazz. Adv. Complex Syst. 6(4), 565–573 (2003)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Trufanov, A., Kinash, N., Tikhomirov, A., Berestneva, O., Rossodivita, A. (2017). Optimal Information Security Investment in Modern Social Networking. In: Gonçalves, B., Menezes, R., Sinatra, R., Zlatic, V. (eds) Complex Networks VIII. CompleNet 2017. Springer Proceedings in Complexity. Springer, Cham. https://doi.org/10.1007/978-3-319-54241-6_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-54241-6_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54240-9
Online ISBN: 978-3-319-54241-6
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)