500-word summary article about Security in Social Networking Services

To: Prof. Ellis

From: Quazi Hedayet

Date: 10/05/2021

Subject: 500-word summary article about Security in Social Networking Services

The following article is a 500-word summary of a peer-reviewed titled, “Geosocial Media as a Proxy for Security: A Review” by Mr.Zhigang Han, Somgnian Li, Caihui Cui, Daojun Han, and Hongquan Song, published in 2019. The article identifies various prominent themes in need of more research in the ongoing growth of social security concern and cybercrime management. While most people are looking for a quick fix, the author takes a different approach to redefine the concept of security in social networking, emphasizing the importance of users’ privacy and security concerns in the development of long-term social networking, and using geosocial media as a proxy for this security. 

Social networking is a collection of rules and configurations for maintaining the integrity, confidentiality, and usefulness of all software and hardware technologies used in computer networks and data. Any firm, regardless of size, sector, or infrastructure, needs network security solutions in place to protect itself from the ever-growing array of cyber-attacks in the wild today. 

In other words, the author intends to explain to the public that network security is the protection against hacking, misuse, and unwanted device access to files and directories on a computer network. Specifically, when combined with location data, geosocial media can be utilized as a proxy for security event detection and situational awareness. This paper summarizes the general structure of security-related analyses based on geosocial media, as well as the geosocial media data and associated processing/analysis methodologies utilized for detecting protection incidents. The scientists write is, “Social media data give extensive information that represents people’s social behavior”. Various terrorist and gang groups have increasingly realized the significance of social media in the security field and have actively used it to plan and organize activities, recruit members, promote terrorist ideas, and post various terrorist messages to grow their influence” (Han et al., 2019, p. 154225). The authors classify security-related analysis tasks into two sorts, based on the economic and moral aspects of an equation: security event detection and security situational awareness and assessment. 

Natural catastrophes, man-made disasters, violent occurrences, military events, sociopolitical events, and other security events are among the six types. When it comes to the analysis of various networking systems, the author goes above and beyond to demonstrate the general process of security-related analysis based on geosocial media, identifying two types of data sets: social media datasets and auxiliary analysis datasets, as well as discussing the data acquisition and preprocessing methods. Users of geosocial networks and apps, such as Facebook locations can share their geolocated data. Knowing an individual’s location is one of the most serious risks to his privacy of all the Personal Identifiable Information (PII). The prevalence of geosocial media around the world, particularly significant adoption by the urban poor in many developing countries, is one of the most intriguing prospects for the technology. For example, a person’s spatio-temporal data could be used to deduce the location of his home and office, track his movements and activities, learn more about his core interests, or even notice a deviation from his usual behavior. 

Natural language processing, social network analysis, position inference and geospatial analysis, and picture or video interpretation and visual analysis were all highlighted in the papers as significant technology for detecting security occurrences and assessing security situations. The report finishes with potential future research directions and areas to be addressed and examined.

REFERENCES:Han, Z., Li, S., Cui, C., Han, D., & Song H. (2019). Geosocial Media as a Proxy for Security: A Review. IEEE Access, 7, 154224-154238. https://doi-org.citytech.ezproxy.cuny.edu/10.1

Leave a Reply