Summary of Han et al.’s “Geosocial Media as a Proxy for Security: A Review”

To: Prof. Ellis

From: MD Jahirul Hasan

Date: 03/03/2021

Subject: 500-Word Summary of Article About Security in Social Networking

The following is 500-word summary of a peer reviewed article Geosocial Media as a Proxy for Security: A Review” by mr.Zhigang Han, Somgnian li, caihui cui, daojun han and Hongquan Song published in 2019 identifies various prominent themes in need of more research in the continuous growth of social security concern and cybercrime management. While the majority of the people are running after the short-term solution the author takes a different approach to redefine the concept of security in social networking where the user’s privacy and security concerns play a vital role in the development of a sustainable social networking and considered geosocial media as a proxy for this security. Social networking is a set of rules and configurations designed to preserve the integrity, confidentiality and usability of all software and hardware technologies for computer networks and data. To protect it from the ever-growing landscape of cyber threats in the wild today, any company, regardless of scale, sector or infrastructure, needs a degree of network security solutions in place. In other words, the author tries to make it clear to the people that Network security is the defense against hacking, misuse and unauthorized device alteration of access to files and directories on a computer network. In specific, geosocial media when paired with location information can be used as a proxy for security event detection and security situational awareness. This paper includes a synopsis of the geosocial media data and the associated processing/analysis methods used for detecting protection events and summarize the general framework of security-related analyses based on geosocial media. According to the authors, “Social media data provide rich information that reflects people’s social behavior. In the security field, various groups of terrorists and gangs have increasingly recognized the value of social media and have actively used it to plan and organize activities, recruit members, spread terrorist ideas and publish various terrorist messages to expand their influences” (Han et al., 2019, p. 154225. Considering the economical and moral elements of an equation the authors divide the security-related analysis tasks into two types: security events detection and security situational awareness and assessment. There are six types, including natural disasters, man-made disasters, violent incidents, and military events, sociopolitical events and others security events. Turning to analysis of different networking system, the author walks an extra mile to illustrate the general process of security-related analysis based on geosocial media, and identified two types of data sets: social media datasets and auxiliary analysis datasets, and discussed the corresponding data acquisition and preprocessing methods. Geosocial networks and apps, such as Facebook locations, are designed to allow their users to share their geolocated data. Among all the Personal Identifiable Information (PII), knowing the position of an individual is one of the greatest threats against his privacy. One of the most exciting prospects for geosocial media is its ubiquity around the world, including its widespread adoption by the urban poor in many developing nations. For instance, the spatio-temporal data of a person may be used to infer the location of his home and workplace, to track his movements and activities, to learn details about his center of interests or even to detect a change from his normal behavior. The articles summarized the progress of key technologies related to security events detection and assessing security situations, including natural language processing, social network analysis, location inference and geospatial analysis, and image or video understanding and visual analysis. The paper concludes with possible future directions and areas of research that could be addressed and investigated.

Reference

Han, Z., Li, S., Cui, C., Han, D., & Song H. (2019). Geosocial Media as a Proxy for Security: A Review. IEEE Access, 7, 154224-154238. https://doi-org.citytech.ezproxy.cuny.edu/10.1109/ACCESS.2019.2949115

Leave a Reply