Social networking sites are a rage among public now a days. Individuals’ keep themselves abreast of latest developments around them through these Online Social Networks (OSNs). With so many activities on OSNs, many a times users tend to reveal the information that may not be appeasing or morally acceptable by other users. Quite possible, though unknowingly, any user may enter into malpractices of spreading hatred among people by posting unethical and unacceptable material. Through this paper, the author has tried to resolves zooming issues of socially unacceptable postings by providing a new framework for controlling the user’s actions on OSNs and thereby trying to minimize the menace of notorious activities.


Social networks security privacy spamming phishing malpractice credibility 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Yager, R.R.: Granular Computing for Intelligent Social Network Modeling and Cooperative Decisions. In: International IEEE Conference: Intelligent Systems (2008)Google Scholar
  2. 2.
    Adar, E., Re, C.: Managing Uncertainty in Social Networks. Data Engineering Bulletin 30, 23–31 (2007)Google Scholar
  3. 3.
    Borgatti, S.P., Mehra, A., Brass, J.D., Labianca, G.: Network Analysis in the Social Sciences. Science 323(5916), 892–895 (2009)CrossRefGoogle Scholar
  4. 4.
    Madden, M., Zickuhr, K.: 65% of Online Adults use Social Networking Sites. In: a project of PewResearchCenter (August 26, 2011),
  5. 5.
    McRaney, D.: You Are Not So Smart - Book Trailer – Procrastination,
  6. 6.
    Gorshkov, I.: The Internet and Social Information Networks in Contemporary Politics. In: International Scientific Conference Networks in the Global World: Structural Transformations in Europe, June 22-24, St. Petersburg, US (2012), Google Scholar
  7. 7.
    Foreign Social Networking Sites Summoned by Court. In: Hindustan Times, New Delhi (January 13, 2012),
  8. 8.
    Sharma, A.: Facebook, Google to Stand Trial in India. The Wall Street Journal, Technology (March 13, 2012),
  9. 9.
    Thibeau, D.: Open Trust Frameworks for Open Government: Enabling Citizen Involvement through Open Identity Technologies (August 2011),
  10. 10.
    Maler, E., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security and Privacy 6, 16–23 (2008), Google Scholar

Copyright information

© ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering 2013

Authors and Affiliations

  • Gambhir Mohit
    • 1
  • Doja M.N.
    • 2
  • Moinuddin
    • 3
  1. 1.Jamia Millia IslamiaNew DelhiIndia
  2. 2.Dept. of Computer EngineeringNew DelhiIndia
  3. 3.Delhi Technological UniversityNew DelhiIndia

Personalised recommendations