Scheduled System Maintenance:
On May 6th, single article purchases and IEEE account management will be unavailable from 8:00 AM - 12:00 PM ET (12:00 - 16:00 UTC). We apologize for the inconvenience.
By Topic

Security and privacy analysis in social network services

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Pimenta, P.C. ; Dept. de Sist. de Informacao, Univ. do Minho, Guimarães, Portugal ; de Freitas, C.M.

The developers of social network services, due to pressure related with short development cycles, costs and usability, often disregard its security and privacy. Thus, they need documental support that provides a quick search concerning the best development habits of these two components. This article shows an updated analysis of security and privacy within these services and presents solutions for specific situations. In order to do that, we made a literature revision, complemented later with field work, being the result the identification of problems and security and privacy mechanisms, as well as their most common functionalities. Our field work consisted of an exploration of 18 social network services, based on a form developed to standardize the tests that were planned (n consegui melhor tradução. Espero que a ideia seja a mesma). Lastly, we analyzed the security and privacy mechanisms' identified functionalities in terms of quantity and quality. We also described the best practices related to security and privacy, for the development of functionalities that are safer and respect the final users' privacy. We found out that nowadays, privacy of information and contents of the profile and of the search results is constantly violated; that the best practices regarding the definition of the password are not demanded and that the information that is available in these services is often insufficient and dubious.

Published in:

Information Systems and Technologies (CISTI), 2010 5th Iberian Conference on

Date of Conference:

16-19 June 2010