- Full Description
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
- Table of Contents
Table of Contents
- Part I: Privacy and Trust.
- Computational Social Networks: Security and Privacy.
- Security, Privacy and Trust in Social Networks.
- Blogging Around the Globe: Motivations, Privacy Concerns and Social Networking.
- Privacy in Online Social Networks.
- Privacy Settings in Online Social Networks as a Conflict of Interests.
- A Reliability
- Based Metric for Inferring Trust from Recommendations in Knowledge Sharing Networks.
- Part II: Security and Applications.
- Measurement Methods of User Behavior in Online Social Networks.
- Exploring Influence and Interests among Users within Social Networks.
- User Cooperation, Virality and Gaming in a Social Mobile Network: The Gedda
- Headz Concept.
- An Effective User
- Driven Framework for Selection of Social Network Services.
- Opinion Mining for Social Networking: An Approach and Impact.
- Part III: Anonymity.
- Providing Group Anonymity in Social Networks.
- Anonymisation of Social Networks and a Rough Set Approach.
- Behavioural Patterns and Social Networks in Anonymity Systems.
If you think that you've found an error in this book, please let us know by emailing to email@example.com . You will find any confirmed erratum below, so you can check if your concern has already been addressed. No errata are currently published