Computational social networks : security and privacy / Ajith Abraham, editor.

"The study of computational social networks (CSNs) is an emerging interdisciplinary field, concerned with the intersection of social behavior and computer systems. With the increasing popularity of social networking sites such as Myspace and Facebook, issues such as stalking, identity theft, se...

Full description

Saved in:
Bibliographic Details
Other Authors: Abraham, Ajith, 1968- (Editor)
Format: Ebook
Language:English
Published: London : Springer, [2012]
Subjects:
Online Access:Springer eBooks

MARC

LEADER 00000czm a2200000 i 4500
003 OCoLC
005 20221110064958.0
006 m o d
007 cr cnu---|nuuu
008 120822s2012 enka ob 001 0 eng d
010 |a  2012944711 
011 |a Direct Search Result 
011 |a EDS Title: Computational Social Networks: Security and Privacy (Security and Privacy) 
011 |a MARC Score : 11000(24700) : OK 
020 |z 1447140508  |q print 
020 |z 9781447140504  |q print 
035 |a (EDS)EDS1413097 
035 |a (OCoLC)807737524 
037 |a 392415  |b MIL 
040 |a GW5XE  |b eng  |e rda  |c GW5XE  |d YDXCP  |d COO  |d CDX  |d OCLCO  |d OCLCQ  |d OSU  |d FTU  |d MYG  |d DKDLA  |d E7B  |d N$T  |d NLGGC  |d DEBBG  |d VT2  |d SAV  |d IOG  |d OCLCA  |d ATU 
050 4 |a TK5105.888  |b .C66 2012b 
082 0 4 |a 006.754  |2 23 
245 0 0 |a Computational social networks :  |b security and privacy /  |c Ajith Abraham, editor. 
264 1 |a London :  |b Springer,  |c [2012] 
264 4 |c ©2012 
300 |a 1 online resource (xiii, 347 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references and index. 
505 0 0 |g pt. I.  |t Privacy and trust. --  |t Computational social networks: security and privacy /  |r Mostafa Salama, Mrutyunjaya Panda, Yomna Elbarawy, Aboul Ella Hassanien, and Ajith Abraham --  |t Security, privacy, and trust in social networks /  |r Komathy Karuppanan --  |t Blogging around the globe: motivations, privacy concerns, and social networking /  |r Mei Kobayashi --  |t Privacy in online social networks /  |r Michael Beye, Arjan J.P. Jeckmans, Zekeriya Erkin, Pieter Hartel, Reginald L. Lagendijk, and Qing Tang --  |t Privacy settings in online social networks as a conflict of interests: regulating user behavior on Facebook /  |r Max-R. Ulbricht --  |t A reliability-based metric for inferring trust from recommendations in knowledge sharing networks /  |r Weisen Guo and Steven B. Kraines --  |g pt. II.  |t Security and applications --  |t Measurement methods of user behavior in online social networks /  |r László Gyarmati and Tuan Anh Tinh --  |t Exploring influence and interests among users within social networks /  |r Jose Simoes, Julia Kiseleva, Elena Sivogolovko, and Boris Novikov --  |t User cooperation, virality and gaming in a social mobile network: the Gedda-Headz concept /  |r Csaba Varga, Laszlo Blazovics, Hassan Charaf, and Frank H.P. Fitzek --  |t An effective user-driven framework for selection of social network services /  |r Salaja Silas, Kirubakaran Ezra, and Elijah Blessing Rajsingh --  |g pt. III.  |t Anonymity --  |t Providing group anonymity in social networks /  |r Oleg Chertov and Dan Tavrov --  |t Anonymisation of social networks and rough set approach /  |r Bala Krishna Tripathy --  |t Behavioural patterns and social networks in anonymity systems /  |r Kamil Malinka and Petr Hanáčk. 
520 |a "The study of computational social networks (CSNs) is an emerging interdisciplinary field, concerned with the intersection of social behavior and computer systems. With the increasing popularity of social networking sites such as Myspace and Facebook, issues such as stalking, identity theft, sexual predators, and employee conduct have all become highly-publicized concerns. Many questions have also been raised about the ethics regarding the storage, management, and sharing of data held by CSNs. This comprehensive text/reference is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review Tools, Perspectives, and Applications, and Mining and Visualization in CSNs). Topics and features: includes a thorough introduction to this exciting and blossoming field; presents the latest advances in security and privacy issues in CSNs, and illustrates how both organizations and individuals can be protected from real-world threats; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology."--Publisher's description. 
588 |a Machine converted from AACR2 source record. 
588 0 |a Print version record and online resource; title from PDF title page (SpringerLink, viewed Sept. 23, 2013). 
650 0 |a Computer security.  |9 327365 
650 0 |a Computers  |x Social aspects.  |9 370950 
650 0 |a Online social networks  |x Security measures  |9 812244 
650 0 |a Social networks  |x Data processing  |9 780161 
700 1 |a Abraham, Ajith,  |d 1968-  |e editor.  |9 248954 
776 0 8 |i Print version:  |t Computational social networks.  |d London : Springer, 2012  |z 9781447140504  |w (DLC) 2012944711  |w (OCoLC)800858299 
776 1 8 |w (OCoLC)810546367  |w (OCoLC)811005910  |w (OCoLC)811564645  |w (OCoLC)812095162  |w (OCoLC)835884821  |w (OCoLC)858884148  |w (OCoLC)985031080  |w (OCoLC)1005822494  |w (OCoLC)1011784604 
856 4 0 |u https://ezproxy.aut.ac.nz/login?url=https://link.springer.com/10.1007/978-1-4471-4051-1  |z Springer eBooks  |x TEMPORARY ERM URL 
907 |a .b24438820  |b 06-09-21  |c 23-11-17 
942 |c EB 
998 |a none  |b 11-01-18  |c m  |d z   |e -  |f eng  |g enk  |h 0 
999 |c 1440314  |d 1440314 
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.