International Research journal of Management Science and Technology

  ISSN 2250 - 1959 (online) ISSN 2348 - 9367 (Print) New DOI : 10.32804/IRJMST

Impact Factor* - 6.2311


**Need Help in Content editing, Data Analysis.

Research Gateway

Adv For Editing Content

   No of Download : 130    Submit Your Rating     Cite This   Download        Certificate

SESSION DETAILS UNDERGOING EXPLOITATION

    1 Author(s):  SREE LAKSHMI V

Vol -  2, Issue- 3 ,         Page(s) : 94 - 96  (2011 ) DOI : https://doi.org/10.32804/IRJMST

Abstract

Everyone knows that today social networking sites have gained its control over the entire world. Every single human being is running after making social relationships. They feel free to share anything and everything that comes to their mind. Every moment of their life reflects now through the so called social sites. But, how much is this reliable? No one ever bothers it. How much concerned are you regarding the information you post? How much are you aware of the privacy policies? Can you assure that your personal details are not being disclosed before any third party? It has been found that every single bit of information is under the threat of exploitation by means of social network extraction methods for varying purposes.

  1. BBC. (2010). Israeli military 'unfriends' soldier after Facebook leak. Retrieved 9 March 2010, from http://news.bbc.co.uk/2/hi/ mid dle_east/8 549099.stm 
  2. Boyd, d. (2006a). Friends, Friendsters, and MySpace Top 8: Writing community into being on social network sites.
  3. Colwill, C. (2010). Human factors in information security: The insider threat - Who can you trust these days? Information Security Technical Report, in press. CSI. (2009). 14th Annual CSI Computer Crime and Security Survey: Executive Summary. New York: Computer Security Institute.
  4. Cory L. Kutcher, Social Network Analysis – Linking Foreign Terrorist Organizations, Research Article, October 11, 2005.
  5. ISO/IEC (2005). Information technology - Security techniques - Code of practice for information security management, ISO/IEC 17799:2005(E)

*Contents are provided by Authors of articles. Please contact us if you having any query.






Bank Details