Analyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks

Authors

1 Department of Information Technology Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

2 Department of Industrial Engineering, Information Technology Group, K. N.Toosi University of Technology, Tehran, Iran

Abstract

The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished and this study builds a research model to examine privacy concerns and the effect of it on self-disclosure. The need of having knowledge and skill about privacy protection seems to be necessary with social networks technology developments. Most of the researches have been studied about privacy protection scope related to users’ privacy on social networks including women, men, children and adults in smartphone and E-health. Most of researches on this scope have been done in USA. Most studies were focused on privacy protection and security on social networks.

Keywords


1.     Cheng, P.H. and Chen, L.W., "Peer learning efficacy analysis on undergraduate software design course", Computer Applications in Engineering Education,  Vol. 26, No. 1, (2018), 5-16.

2.     Lwin, M.O., Miyazaki, A.D., Stanaland, A.J. and Lee, E., "Online usage motive and information disclosure for preteen children", Young Consumers,  Vol. 13, No. 4, (2012), 345-356.

3.     Hamidi, H. and Jahanshahifard, M., "The role of the internet of things in the improvement and expansion of business", Journal of Organizational and End User Computing (JOEUC),  Vol. 30, No. 3, (2018), 24-44.

4.     Li, H., Yimin, Z., Mengshi, C., Xun, L., Xiulan, L. and Ying LIANG, H.T., "Development and validation of a disease severity scoring model for pediatric sepsis", Iranian Journal of Public Health,  Vol. 45, No. 7, (2016), 875-884.

5.     Christofides, E., Muise, A. and Desmarais, S., "Hey mom, what’s on your facebook? Comparing facebook disclosure and privacy in adolescents and adults", Social Psychological and Personality Science,  Vol. 3, No. 1, (2012), 48-54.

6.     Shin, W. and Kang, H., "Adolescents' privacy concerns and information disclosure online: The role of parents and the internet", Computers in Human Behavior,  Vol. 54, No., (2016), 114-123.

7.     Ajami, R., Al Qirim, N. and Ramadan, N., "Privacy issues in mobile social networks", Procedia Computer Science,  Vol. 10, (2012), 672-679.

8.     A., P. and H., H., "An approach to managing and organizing text documents using intelligent text analysis", Journal of Information Processing and Management,  Vol. 32, No. 4, (2017), 1171-1202.

9.     Stol, W.P., Kaspersen, H., Kerstens, J., Leukfeldt, E. and Lodder, A., "Governmental filtering of websites: The dutch case", Computer Law & Security Review,  Vol. 25, No. 3, (2009), 251-262.

10.   Gerlach, J., Widjaja, T. and Buxmann, P., "Handle with care: How online social network providers’ privacy policies impact users’ information sharing behavior", The Journal of Strategic Information Systems,  Vol. 24, No. 1, (2015), 33-43.

11.   Johnson, R.D., Li, Y. and Dulebohn, J.H., "Unsuccessful performance and future computer self-efficacy estimations: Attributions and generalization to other software applications", Journal of Organizational and End User Computing (JOEUC),  Vol. 28, No. 1, (2016), 1-14.

12.   Piao, C., Li, X. and Pan, X., "Research on the user privacy protection method in mobile commerce", in 2014 IEEE 11th International Conference on e-Business Engineering (ICEBE), IEEE., (2014), 177-184.

13.   Thayananthan, V. and Albeshri, A., "Big data security issues based on quantum cryptography and privacy with authentication for mobile data center", Procedia Computer Science,  Vol. 50, (2015), 149-156.

14.   Abad, F., Saeed, A. and Hamidi, H., "An architecture for security and protection of big data", International Journal of Engineering,  Vol. 30, No. 10, (2017), 1479-1486.

15.   Najaflou, Y., Jedari, B., Xia, F., Yang, L.T. and Obaidat, M.S., "Safety challenges and solutions in mobile social networks", Systems Journal, Vol. 9, No. 3, (2013), 1-21.

16.   Daraei, A. and Hamidi, H., "An efficient predictive model for myocardial infarction using cost-sensitive j48 model", Iranian Journal of Public Health,  Vol. 46, No. 5, (2017), 682.

17.   Liu, Y., Tan, C.-H. and Sutanto, J., "Selective attention to commercial information displays in globally available mobile application", Journal of Global Information Management (JGIM),  Vol. 24, No. 2, (2016), 18-38.

18.   Sun, Y., Wang, N., Shen, X.-L. and Zhang, J.X., "Location information disclosure in location-based social network services: Privacy calculus, benefit structure, and gender differences", Computers in Human Behavior,  Vol. 52, (2015), 278-292.

19.   Wu, J., Ding, F., Xu, M., Mo, Z. and Jin, A., "Investigating the determinants of decision-making on adoption of public cloud computing in e-government", Journal of Global Information Management (JGIM),  Vol. 24, No. 3, (2016), 71-89.

20.   Rowan, M. and Dehlinger, J., "A privacy policy comparison of health and fitness related mobile applications", Procedia Computer Science,  Vol. 37, (2014), 348-355.

21.   Hamidi, H., Vafaei, A. and Monadjemi, S.A., "A framework for abft techniques in the design of fault-tolerant computing systems", EURASIP Journal on Advances in Signal Processing,  Vol. 2011, No. 1, (2011), DOI: 10.1186/1687-6180-2011-90.

22.   Zlatolas, L.N., Welzer, T., Heričko, M. and Hölbl, M., "Privacy antecedents for sns self-disclosure: The case of facebook", Computers in Human Behavior,  Vol. 45, (2015), 158-167.

23.   Bimonte, S., Sautot, L., Journaux, L. and Faivre, B., "Multidimensional model design using data mining: A rapid prototyping methodology", International Journal of Data Warehousing and Mining (IJDWM),  Vol. 13, No. 1, (2017), 1-35.

 24.   Hamidi, H. and Mousavi, R., "Analysis and evaluation of a framework for sampling database in recommenders", Journal of Global Information Management (JGIM),  Vol. 26, No. 1, (2018), 41-57.

25.   Esposito, C. and Ficco, M., "Recent developments on security and reliability in large-scale data processing with mapreduce", International Journal of Data Warehousing and Mining (IJDWM),  Vol. 12, No. 1, (2016), 49-68.

26.   Hamidi, H. and Chavoshi, A., "Analysis of the essential factors for the adoption of mobile learning in higher education: A case study of students of the university of technology", Telematics and Informatics,  Vol. 35, No. 4, (2018), 1053-1070.

27.   Hamidi, H., Vafaei, A. and Monadjemi, A., "Algorithm based fault tolerant and check pointing for high performance computing systems", Journal of Applied Science,  Vol. 9, No. 22, (2009), 3947-3956.

28.   Trepte, S. and Reinecke, L., The social web as a shelter for privacy and authentic living, in Privacy online. 2011, Springer.61-73.

29.   Hamidi, H. and Moradi, S., "Analysis of consideration of security parameters by vendors on trust and customer satisfaction in e-commerce", Journal of Global Information Management (JGIM),  Vol. 25, No. 4, (2017), 32-45.

30.   Malhotra, N.K., Kim, S.S. and Agarwal, J., "Internet users' information privacy concerns (iuipc): The construct, the scale, and a causal model", Information systems research,  Vol. 15, No. 4, (2004), 336-355.

31.   Karimzadeh-Farshbafan, M. and Ashtiani, F., "Semi-myopic algorithm for resource allocation in wireless body area networks", IET Wireless Sensor Systems,  Vol. 8, No. 1, (2017), 26-35.

32.   Al Shaheen, H. and Takruri-Rizk, H., "Improving the energy efficiency for the wbsn bottleneck zone based on random linear network coding", IET Wireless Sensor Systems,  Vol. 8, No. 1, (2017), 17 –25, DOI:  10.1049/iet-wss.2017.0056.

33.   Hamidi, H. and Hashemzadeh, E., "An approach to improve generation of association rules in order to be used in recommenders", International Journal of Data Warehousing and Mining (IJDWM),  Vol. 13, No. 4, (2017), 1-18.

34.   Chen, R., "Living a private life in public social networks: An exploration of member self-disclosure", Decision Support Systems,  Vol. 55, No. 3, (2013), 661-668.

35.   Echeverría, L., Cobos, R., Machuca, L. and Claros, I., "Using collaborative learning scenarios to teach programming to non‐cs majors", Computer Applications in Engineering Education,  Vol. 25, No. 5, (2017), 719-731.

36.   Hamidi, H. and Daraei, A., "Analysis of pre-processing and post-processing methods and using data mining to diagnose heart diseases", International Journal of Engineering-Transactions A: Basics,  Vol. 29, No. 7, (2016), 921-930.