Privacy in Social Networks.
Privacy in Social Networks
Morgan & Claypool Publishers
Social networks are websites that allow users to build connections and relationships to other Internet users. There are many ways that information on social networks can be used for purposes other than what the user intended. This leads to the privacy question in social networks. Realizing this threat the authors have developed an edition highlighting the risk of social networks,
This book has nine chapters organized in three parts. In the opening chapter on the introduction the authors have made it clear that this work differs considerably from other published works that it addressed the privacy issues in the perspectives of modelling, managing and protecting. In the second chapter the authors provided a framework for social networks, By taking Facebook they have presented a generic model. With the help of a clear architecture they have provided the differences between the real world networks and online networks. In the third chapter on Types of Privacy Disclosure they have valued the significance of defining the failure to preserve privacy, The two privacy breaches identify disclosure and attribute disclosure are addressed in detail,
Discovering hidden knowledge in social networks is a compelling one the authors argued in the next chapter. Thus the models for link mining are explored in the chapter. These models the authors viewed that can be used for inference which will be the advantage for the users. In the next chapter they have provided a model to show how the data providers sanitize the data by approximation. Besides, the differential privacy is also explained with the help of a few definitions.
In the sixth chapter on Attacks and Privacy preserving mechanisms, they have addressed the current privacy mechanisms for social and affiliation networks. The authors have outlined the approaches to anonmyzing the data which considers the utility and attributes for social links.
In the seventh chapter the models of information sharing particularly about the person to person communication are discussed, Users privacy risk due to the information sharing in social networks is the crux of the problem which is presented in the next chapter. They have summarized the mechanism that provides a feedback score. This practical model is more worth to measure privacy and it is one of the best contributions of this book, In the last chapter on Management of Privacy Settings the privacy management user interfaces are described. This book is supplemented with an extensive bibliography of 110 items. This book is unique in presenting the privacy issues in social networks.
King Mongkut's University of
Technology, North Bangkok
|Printer friendly Cite/link Email Feedback|
|Publication:||Journal of Digital Information Management|
|Article Type:||Book review|
|Date:||Aug 1, 2015|
|Previous Article:||Paper hijacking: hijackers are attacking journals for hijacking unpublished papers.|
|Next Article:||Fourth International Conference on Future Generation Communication Technologies (FGCT 2015) University of Bedfordshire, Luton (near London) UK July...|