Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2014, Vol 5, Issue 12
Abstract
Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ways to use stolen information, examples and other aspects. A study on the local community was also conducted. In the survey, the participants were asked about privacy on SN’s, SN’s privacy policies, and whether they think that SN’s benefits outweigh their risks. A social experiment was also conducted on FB and Twitter to show how fragile the systems are and how easy it is to gain access to private profiles. Results from the survey are scary: 43% of all the accounts are public, 76% of participants do not read the policies, and almost 60% believe that the benefits of SN’s outweigh their risks. Not too far from this, the results of the experiment show that it is extremely easy to obtain information from private accounts on FB and Twitter.
Authors and Affiliations
Ahmad Al-Daraiseh, Afnan Al-Joudi, Hanan Al-Gahtani, Maha Al-Qahtani
Prolonging the Network Lifetime of WSN by using the Consumed Power Fairly Protocol
In wireless sensor networks (WSN), energy saving is always a key concern. Since nodes have limited power, some of them may use specific routes, thus leading to exhaustion of intermediate nodes. These nodes die, which res...
NEB in Analysis of Natural Image 8 × 8 and 9 × 9 High-contrast Patches
In this paper we use the nudged elastic band tech-nique from computational chemistry to investigate sampled high-dimensional data from a natural image database. We randomly sample 8 × 8 and 9 × 9 high-contrast patches of...
Intelligent Image Watermarking based on Handwritten Signature
With the growth of digital technology over the past decades, the issue of copyright protection has become especially important. Digital watermarking is a suitable way of addressing this issue. The main problem in the are...
Transfer Learning Method Using Ontology for Heterogeneous Multi-agent Reinforcement Learning
This paper presents a framework, called the knowledge co-creation framework (KCF), for heterogeneous multiagent robot systems that use a transfer learning method. A multiagent robot system (MARS) that utilizes reinforcem...
An Extensive Survey over Traffic Management/Load Balance in Cloud Computing
Cloud Computing (CC) is all about carrying out processing in other's system. There are various vendors who provide CC services. The basic algorithm that should be met to access CC services is a need for steady internet c...