privacy and trust in virtually slide

44
PRIVACY AND TRUST IN VIRTUALLY ON SOCIAL NETWORKING

Upload: thaleswary

Post on 10-Apr-2018

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 1/44

PRIVACY AND TRUST IN VIRTUALLY

ON SOCIAL NETWORKING

Page 2: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 2/44

INTRODUCTION

Social networking sites are a type of virtual

community that has grown tremendously in

popularity for over the past few years.

Type of social networking

Facebook MySpace Friendster

LinkedIn Ning Plaxo

Page 3: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 3/44

MAIN PURPOSE

Communication

Making Relationship

Page 4: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 4/44

USERS’ CONTROLS OVER THE PRIVACY ON THEIR

INFORMATION AND PRIVACY CONTROLS ON SOCIAL

NETWORKING SITES.

This is one of the major concern on social

networking services.

People’s complaints about social networking

sites indiscriminately distributing their

personal data on the Web are unconvincing

when they have already made an explicit

choice to expose that data in a public space.

Page 5: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 5/44

o With expectations that these services will respect user

intentions, they publish their information.

o

Different social networking sites give users different rights foreach data type.

o Eg Facebook

• provides complete privacyOnly Me

• permits an explicit list of people to access the

ObjectSome Friends

• permits all friends to access the Object—of course,

implying friends within the Facebook networkOnly Friends

• broadens access to all of a user’s

friends, plus friends of their friendsFriends of Friends

• makes the Object completely publicEveryone on

Facebook

Page 6: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 6/44

Although Facebook has

modified their privacy settingbut it still looks like the site

provides control at the wrong

level of granularity. The

categorization of Friends,

Friends of Friends, and

Everyone is too coarse, but

the ability to specify a list of 

individuals is too fine.

Page 7: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 7/44

It's also clear that users should have differentrights with respect to each data type.

• We should be allowed to export, change, and

delete disclosed data, even if the social

networking sites don't want us to.

• It's less clear what rights we have for

entrusted data, and far less clear for incidental

data.

Page 8: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 8/44

TRUST IN THE SOCIAL NETWORKING SITES AND TRUST

IN OTHER MEMBERS ON SOCIAL NETWORKING

Facebook and MySpace will be an example as

a study about comparison between Facebook

and MySpace have been conducted and

presented at Americas Conference on

Information Systems (AMCIS) 2007

Page 9: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 9/44

MySpace

• MySpace members are more experience using the siteto meet new people.

• In other word making new relationship developmenteven though MySpace have weaker trust result in thisstudy.

• This show that MySpace members have confidence intheir capacity to evaluate others and true is not asnecessary in the building of new relationships.

• The ability to ignoring messages or blocking accessminimizes the risk exploring online relationships.

Page 10: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 10/44

FACEBOOK• Facebook members are more willing to share identifying

information; they are exposing to the identity thief 

• In late 2009, Sophos conducted an experiment to see how

easy it can be to steal vital personal data from Facebook users

by creating 2 fake accounts.

• RESULTS

• In the hands of an identity thief, this valuable information can

be easily exploited

46% of users accepted the friend requests even though the owners of 

the Facebook accounts are strangers for them.

89% of the friended users in their 20s reveal their full birthdate on

their profile.

Page 11: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 11/44

Best Practice on Security Recommended by

Sophos For Facebook Users

Disable options, then open them one by one.

Show “limited friends” a cut-down version of your profile

Think carefully about who you allow to become your friend

Read the Facebook guide to privacy

Adjust Facebook privacy settings to help protect your identity

Page 12: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 12/44

TRUST IN ONLINE SELLING ON SOCIAL NETWORKING

In the grand scheme of online marketing, the catchphrase “People Trust

People” is a foundational principle. We can see many advertisements at the right side of the Facebook page.

Most of these advertisements are about online marketing on selling their

products

Users of Facebook also create the accounts to sell their product which

they update the new product, information of the product, and picture of the product easily

The main problem is the users trust on this kind of marketing

Some users that they have been lied by those owner of the Facebook

account that sell product such as clothes, watch, and others.

.This will give effect to others people or company to do this kind of 

marketing as people start to distrust this kind of marketing

Page 13: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 13/44

Ways to gain trust from users if making online

marketing on social networking.

• Get verification from Trust Guard

One of their products provided to on-line businesses is their Security

Verified Seal. The seal shows online consumers that the site they are

patronizing has gone through various steps to verify to the general public

that they have a valid SSL and that consumers will be able to locate them if 

ever there are issues.

• Get verification from Shopper Approved.

Shopper Approved social proof which brought us the proof in the form of 

testimonials and ratings (from 1-5) from previous consumers.

• Having an active presence within social networks provide an ideal way for

buyers and sellers to build genuine, personal relationships with each other

from which trust, loyalty, and advocacy can grow.

Page 14: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 14/44

•Facebook “Like” Button

As a conversion expert

Charles Nicholls said that theimpact of the Facebook "Like"

button cannot be

underestimated. It is

becoming an "index of  

content on the web, where

the index is built based onmass popularity, as opposed

to an arbitrary Google

algorithm," said Nicholls. As

such, its importance has

implications not only where

social media is concerned,but for search engine

marketing as well.

Page 15: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 15/44

FUTURE INTERNET

Page 16: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 16/44

Meaning

Future Internet is a summarizing term for

worldwide research activities dedicated to the

further development of the original internet

Internet has become essential for enabling data

information and flow exchanges all over the

world enabling in turn a wide range of 

applications and services. Future Internet socio-economics studies the

relationship between any sort of economic

activity and the social life of users

Page 17: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 17/44

Advantages

Communication

• Communication will be faster and reliable.

Information

• Any kind of information on any topic under sun isavailable on the Internet.

Page 18: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 18/44

Service

• More service provided such as online banking, job seeking

Entertainment• There are numerous things that can be found. Music,

hobbies, news can be found and shared on the Internet.

Page 19: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 19/44

Ecommerce

• Ecommerce is the concept used for any typeof commercial maneuvering, or business

deals that involves the transfer of 

information across the globe via Internet

Page 20: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 20/44

Page 21: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 21/44

Virus threatVirus is nothing but a program which disrupts the normalfunctioning of your computer systems. Computers attachedto internet are more prone to virus attacks and they can endup into crashing your whole hard disk, causing youconsiderable headache.

Pornography:This is perhaps the biggest threat related to your children’shealthy mental life. A very serious issue concerning the

Internet. There are thousands of pornographic sites on theInternet that can be easily found and can be a detrimentalfactor to letting children use the Internet.

Page 22: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 22/44

E-COMMERCE

Page 23: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 23/44

what

E-commerce is the buying and selling of goods and services on the Internet, especiallythe World Wide Web.

E-commerce can be divided into: E-tailing - sites with online catalogs, sometimes gathered

into a "virtual mall

Electronic Data Interchange (EDI), the business-to-

business exchange of data

E-Mail and fax and their use

Business-to-business buying and selling

The security of business transactions

Page 24: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 24/44

e-commerce

E-tailing

• sites withonline

catalogs,sometimesgathered intoa "virtual mall

EDI

• ElectronicData

Interchange• business-to-

businessexchange of 

data

E-Mail & Fax

• use as mediafor reaching

prospects andestablishedcustomers(for example,

withnewsletters)

Page 25: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 25/44

Business-to-businessbuying and selling

• Web provides notonly a 24-hour-a-dayshowcase for theirproducts but a quickway to reach theright people in acompany for moreinformation.

E-Mail, Fax, andInternet Telephony

• Most of this is

business-to-business, with somecompaniesattempting to use e-mail and fax forunsolicited ads

(usually viewed asonline junk mailor spam) toconsumers and otherbusiness prospects.

Security of BusinessTransactions

• ontrolling access toresources such asWeb pages forregistered orselected users,encryptingcommunications,and, in general,ensuring the privacyand effectiveness of transactions.

Page 26: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 26/44

Best practise

Web server access

* Ensure no update orwrite access

User authentication

* Customers must be

identified throughthe use of a User IDand password

Session security andtimeouts

* can be misused to gainaccess to a customer'saccount.

Content management

* no erroneousinformation

Redundancy

* improve the availabilityof the E-commerce-supporting systems

Page 27: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 27/44

Privacy policy

• Lack of a privacypolicy may result inlitigation

Physical security

• could result inunauthorizedchanges to thesystems.

System andconfiguration file

security

• could result inmodifications byunauthorizedpersonnel

Page 28: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 28/44

Page 29: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 29/44

What is internet banking??

Online banking orInternet banking

provides a fast andconvenient way of 

performingcommon and allows

customers toconduct financialtransactions on a

secure websiteoperated by their

retail or virtualbank, credit unionor building society.

The concept of Internet banking

has thus become arevolution in the

field of banking andfinance.

If you have acomputer with

Internet access, aweb browser and a

registered accountfor Internet bankingfrom your banking

institution, you’ll beable to do your

banking from thecomforts of home,

office or virtuallyanywhere else in the

world.

Page 30: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 30/44

History!!

concept

• The concept of Internet banking has beensimultaneously evolving with the development of theWorld Wide Web.

1980

• .Programmers working on banking data bases cameup with ideas for online banking transactions, sometime during the 1980's.

1983

• In 1983, the Nottingham Building Society, commonlyabbreviated and refereed to as the NBS, launchedthe first Internet banking service in United Kingdom.

Page 31: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 31/44

Advantages…..

*The account holder does nothave to personally visit the bank.

*With the help of Internetbanking many transactions canbe executed by the account

holder.

*When small transactions likebalance inquiry, record of recent

transaction, etc. are to be

processed, the Internet bankingfacility proves to be very handy.

People can

expend theservicessitting athome, totransact

business.

Page 32: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 32/44

Cont. advantages

Bouncing a checkaccidentally should be athing of the past because

you can monitor youraccount online any time,

day or night.

*You can track yourbalance daily, see what

checks have cleared and

when and know whenautomatic deposits and

payments are made.

*This is all possible bysimply going online tothe banks website and

logging into youraccount.

Page 33: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 33/44

Disadvantages…

*In addition to this, a few cases of forgery have been reported in online

banking.

*There are some fraud or proxywebsites, which can hack

information (user name andpassword) entered by a person for

some transaction, and later misuseit.

* In such cases, people lose theirmoney without knowing and by the

time, they get the bill, huge losesmay have been incurred.

Security concerns,like "hackers"

accessing your bankaccounts.

Page 34: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 34/44

Cont. disadvantages

Lack of trust

*Let's face it, many people stilldon't trust the internet.

*For the new users who haveperformed financial transactions

for only a few times, they may stillhave this doubt whether or notthey did the right thing such as

clicked the right button and so on.

*They can only be comfortableonce they print the transaction

receipt and the transactionappeared on the bank statement.

Page 35: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 35/44

Cont. disadvantages

Securityfraud

*Many people shy away from internetbanking because of the security threat.

*They can't help but worry about this

aspect what with news on fraudulent banktransactions that pop up every now andthen.

*However, this should not be a problemas banks that provide internet banking

services prioritize security above anythingelse.

*Since they value their customers, theyalways use the most advanced securitytechnology in protecting their websites.

Page 36: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 36/44

Suggestion..

To prevent online banking from remainingan expensive additional channel that doeslittle to retain footloose customers, banksmust act quickly

The first and most obvious step they should

take is to see to it that the basic problemfueling dissatisfaction has been addressed

Page 37: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 37/44

Cont. suggestion

After repairing this basic deficiency,banks must ensure that their servicesare competitive

Obviously, it should include checking,

savings and brokerage services, whichanchor customers to the institution.

Page 38: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 38/44

PRIVACY AND TRUST IN

VIRTUALLITY WHILE USING

EMAIL

Page 39: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 39/44

E-mail systems are commonly used due to :1)simplicity2)flexibility3)low costs for their implementation and usage.

This systems suffer problems caused by fragilities inthe protocols involved in the communication. There are problems concerning the absence :

1)robust mechanism for sender authentication2) poor confidentiality

3)integrity mechanisms for message delivery4) lacking of a consistent reputation mechanism forusers5)e-mail servers.

Page 40: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 40/44

1. THREATS TO E-MAIL SYSTEMS

The main techniques are based in trustful and non-trustfulservers’ lists, or in scanning received messages to find suspectcontent which are:

• Black Lists: distributed RBL (Real-time Black hole Lists) servers

keep lists of IP address from spam spreaders or sources, whichcan queried through DNS to verify the sender trustworthiness,• White Lists: each e-mail server can keep a list of trustedsenders; this list is commonly managed through a web basedacknowledging mechanism. A variant of this approach is greylisting, in which the list of trusted senders is dynamically built

and managed;• Message Filters: these are programs that filter e-mails accordingto their contents, using statistical techniques,Bayesianclassification, neural networks, header analysis.

Page 41: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 41/44

2. SENDER AUTHENTICATION

The first step in e-mail security is senderauthentication.

It aims to guarantee that the source of a

message is surely known There are manytechniques have been

developed with this goal which are:1)PGP (Pretty Good Privacy),

2)SPF (Sender Policy Framework),3)SenderID4)DKIM

Page 42: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 42/44

3. ARCHITECTURE

The system architecture use concepts of trustnetworks, anti-spam tools, anti-virus tools,and an authentication model to build a trust

management system among e-mail servers(Mail Transport Agents - MTAs).

Page 43: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 43/44

Page 44: Privacy and Trust in Virtually Slide

8/8/2019 Privacy and Trust in Virtually Slide

http://slidepdf.com/reader/full/privacy-and-trust-in-virtually-slide 44/44

• SMTP Server: responsible for messagesreception; it implements the SMTP protocol.

• Sender authentication: implements a domain

authentication method, like SPF or DKIM. • Anti-spam and anti-virus: classifies messages

legitimate or malicious. The filter results areused by the trust management system.

• Trust management system: maintains trustinformation about outside servers, according tothe messages received from them.