Computational Social Networks

Security and Privacy

By Ajith Abraham

Computational Social Networks Cover Image

This book, the second of three volumes exploring the concept of social networks from a computational point of view, offers contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy.

Full Description

  • ISBN13: 978-1-4471-4050-4
  • 360 Pages
  • User Level: Science
  • Publication Date: August 13, 2012
  • Available eBook Formats: PDF
  • eBook Price: $129.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.
Table of Contents

Table of Contents

  1. Part I: Privacy and Trust.
  2. Computational Social Networks: Security and Privacy.
  3. Security, Privacy and Trust in Social Networks.
  4. Blogging Around the Globe: Motivations, Privacy Concerns and Social Networking.
  5. Privacy in Online Social Networks.
  6. Privacy Settings in Online Social Networks as a Conflict of Interests.
  7. A Reliability
  8. Based Metric for Inferring Trust from Recommendations in Knowledge Sharing Networks.
  9. Part II: Security and Applications.
  10. Measurement Methods of User Behavior in Online Social Networks.
  11. Exploring Influence and Interests among Users within Social Networks.
  12. User Cooperation, Virality and Gaming in a Social Mobile Network: The Gedda
  13. Headz Concept.
  14. An Effective User
  15. Driven Framework for Selection of Social Network Services.
  16. Opinion Mining for Social Networking: An Approach and Impact.
  17. Part III: Anonymity.
  18. Providing Group Anonymity in Social Networks.
  19. Anonymisation of Social Networks and a Rough Set Approach.
  20. Behavioural Patterns and Social Networks in Anonymity Systems.
Errata

Please Login to submit errata.

No errata are currently published