Social Networks Security
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F00216305%3A26230%2F09%3APU82619" target="_blank" >RIV/00216305:26230/09:PU82619 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Social Networks Security
Popis výsledku v původním jazyce
Our study analyses possibilities of misusing social network<br>sites due to irresponsible behaviour of users. Recent<br>surveys show that problems of social network are more often<br>to occur, due to openness as one of the key features of<br>these sites.Social engineering can be misused by attackers<br>concerning on social network with the purpose of gaining<br>sensitive information. There is a conflict between users'<br>security awareness and their actual behaviour, so called privacy<br>paradox. We were interested in amount of information<br>people are willing to reveal in their profiles. We have found<br>out users' behaviour which leads to insufficient protection<br>of published information. These sensitive information are<br>suitable for all kindsof phishing and other similar attacks.<br>In our study we compared two groups of fictive profiles<br>(personal profiles of users having no friends and profiles<br>of users with fictive friends) and studied their success in<br>creating new
Název v anglickém jazyce
Social Networks Security
Popis výsledku anglicky
Our study analyses possibilities of misusing social network<br>sites due to irresponsible behaviour of users. Recent<br>surveys show that problems of social network are more often<br>to occur, due to openness as one of the key features of<br>these sites.Social engineering can be misused by attackers<br>concerning on social network with the purpose of gaining<br>sensitive information. There is a conflict between users'<br>security awareness and their actual behaviour, so called privacy<br>paradox. We were interested in amount of information<br>people are willing to reveal in their profiles. We have found<br>out users' behaviour which leads to insufficient protection<br>of published information. These sensitive information are<br>suitable for all kindsof phishing and other similar attacks.<br>In our study we compared two groups of fictive profiles<br>(personal profiles of users having no friends and profiles<br>of users with fictive friends) and studied their success in<br>creating new
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
Z - Vyzkumny zamer (s odkazem do CEZ)
Ostatní
Rok uplatnění
2009
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Proceedings of The Third International Conference on Emerging Security Information, Systems and Technologies
ISBN
978-0-7695-3668-2
ISSN
—
e-ISSN
—
Počet stran výsledku
5
Strana od-do
—
Název nakladatele
International Academy, Research, and Industry Association
Místo vydání
Los Alamitos
Místo konání akce
Athens, Greece
Datum konání akce
14. 6. 2009
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
—