TY - JOUR
T1 - The threats of social networking
T2 - old wine in new bottles?
AU - Weir, George
AU - Toolan, Fergus
AU - Smeed, Duncan
PY - 2011/5
Y1 - 2011/5
N2 - Despite the many potential benefits to its users, social networking appears to provide a rich setting for criminal activities and other misdeeds. In this paper we consider whether the risks of social networking are unique and novel to this context. Having considered the nature and range of applications to which social networks may be applied, we conclude that there are no exploits or fundamental threats inherent to the social networking setting. Rather, the risks and associated threats treat this communicative and social context as an enabler for existing, long established and well-recognised exploits and activities.
AB - Despite the many potential benefits to its users, social networking appears to provide a rich setting for criminal activities and other misdeeds. In this paper we consider whether the risks of social networking are unique and novel to this context. Having considered the nature and range of applications to which social networks may be applied, we conclude that there are no exploits or fundamental threats inherent to the social networking setting. Rather, the risks and associated threats treat this communicative and social context as an enabler for existing, long established and well-recognised exploits and activities.
KW - social networking
KW - cyber crime
UR - http://www.scopus.com/inward/record.url?scp=82455167933&partnerID=8YFLogxK
UR - http://www.journals.elsevier.com/journal-of-information-security-and-applications
U2 - 10.1016/j.istr.2011.09.008
DO - 10.1016/j.istr.2011.09.008
M3 - Article
SN - 1363-4127
VL - 16
SP - 38
EP - 43
JO - Information Security Technical Report
JF - Information Security Technical Report
IS - 2
ER -