Advertisement

Cyber Security pp 215-220 | Cite as

Comparative Study of Security Risk in Social Networking and Awareness to Individual

  • Tosal BhalodiaEmail author
  • Chandani Kathad
  • Keyur Zala
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 729)

Abstract

Nowadays, social networking sites are very greatly used and are continuously growing at its peak. The extraordinary use of all the social networking sites mainly Facebook, Twitter, LinkedIn, and Google Plus involve huge amount of data transferred to public daily. This data transfer involves public information such as personal information, education, professional, etc. which leads to security at personal level. Let us see the comparative study of Facebook, Twitter, LinkedIn, and Google Plus for security risk and how effective it is for well-being to society.

Keywords

Social Facebook Twitter Gplus Linkedin Security Public Private Government regulation Information Security Optimization security measures Vulnerability 

References

  1. 1.
    Abdul Molok NN, Ahmad A, Chang S (2011) Disclosure of organizational information by employees on Facebook: looking at the potential for information security risks. In: 22nd Australasian Conference on Information Systems (ACIS2011), Sydney, AustraliaGoogle Scholar
  2. 2.
    Abdul Molok NN, Chang S, Ahmad A (2013) Discolsure of organizational information on social media: perspectives from security managers. In: 17th Pacific Asia Conference on Information Systems (PACIS2013), Jeju Island, South KoreaGoogle Scholar
  3. 3.
    Agarwal P (2013) Department of Computer Science and Engineering, IIT Delhi. Prediction of trends in online social networkGoogle Scholar
  4. 4.
    CSI (2007) 12th annual computer crime and security survey. Computer Security InstituteGoogle Scholar
  5. 5.
    Eminagaoglu M, Uçar E, Eren S (2009) The positive outcomes of information security consciousness training in companies-A case study. Inf Secur Tech Rep 14:223–229CrossRefGoogle Scholar
  6. 6.
    Neunerdt M, Niermann M, Mathar R, Trevisan B (2013) Focused crawling for building web comment corpora. In: The 10th Annual IEEE CCNC- Work-in-Progress, pp 761–765Google Scholar
  7. 7.
    Olsik J (2011) The ESG information security management maturity model. Enterprise Strategy Group, Milford, MassachusettsGoogle Scholar
  8. 8.
    PricewaterhouseCoopers (2010) Security for social networking. pwc.com.au, AustraliaGoogle Scholar
  9. 9.
    Radianti J, Gonzalez JJ (2007) A preliminary model of the vulnerability black market. SocietyGoogle Scholar
  10. 10.
    Rowe FM, Ciravegna F (2010) Harnessing the social web: the science of identity disambiguation. In: Web Science ConferenceGoogle Scholar
  11. 11.
    Sophos (2011) Security threat report: 2010. Sophos Group, Boston, MassachusettsGoogle Scholar
  12. 12.
    Star T (2012) Don’t become an ‘accidental’ outlaw. In the Star OnlineGoogle Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  1. 1.Atmiya Institute of Technology & ScienceRajkotIndia
  2. 2.Ilaxo.ComRajkotIndia

Personalised recommendations