Affiliation:
1. Clemson University, USA
2. DSBS, School of Computing, College of Engineering and Technology, SRM Institute of Science and Technology, India
3. University of California, Berkeley, USA
Abstract
The emerging social media with inherent capabilities is gaining an edge over comprehensiveness, diversity, and wisdom. Nevertheless, its security and trustworthiness issues have also become increasingly severe, which needs to be addressed urgently. The available studies mainly aim at social media content and user security, including model, protocol, mechanism, and algorithm. Unfortunately, there is a lack of investigation on effective and efficient evaluations and measurements for the security and trustworthiness of various social media tools, platforms, and applications, thus affecting their further improvement and evolution. This chapter first surveyed the social media networks' security and trustworthiness to address the challenge, particularly for the increasingly growing sophistication and variety of attacks and related intelligence applications. The authors introduced a novel approach to assess fundamental platforms, proposing a vital hierarchical crowd evaluation architecture based on signaling theory and crowd computing. They conclude by acknowledging open issues and cutting-edge challenges.
Reference16 articles.
1. BellD. E.LaPadulaL. J. (1973). Secure computer systems: Mathematical foundations and model (Vol. 1). MIT Press.
2. Benet, J. (2016, March). IPFS—content addressed, versioned, P2P file system. arXiv preprint arXiv:1407.3561.
3. Incentive compatibility in the presence of strategic miners.;J.Benet;Proceedings of the 2014 ACM SIGSAC conference on computer and communications security,2014
4. Social Network Sites: Definition, History, and Scholarship
5. CooperA.ReimannR.CroninD.NoesselC. (2014). About face: The essentials of interaction design (4th ed.). Pearson Education.