Abstract
Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ba, S.: Establishing online trust through a community responsibility system. Decision Support Systems 31(3), 323–336 (2001)
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International Conference on World Wide Web, pp. 551–560 (2009)
Bonneau, J., Anderson, J., Anderson, R., Stajano, F.: Eight friends are enough: Social graph approximation via public listings. In: SNS ’09: Second ACM EuroSys Workshop on Social Network Systems, pp. 13–18 (2009)
Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1) (2007)
Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: Somebody you know. In: CCS ’06: 13th ACM conference on Computer and communications security, pp. 168–178 (2006)
Burkhalter, B.: Reading race online: Discovering racial identity in usenet discussions. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 60–75. Routledge, London (1999)
Cameron, K., Jones, M.B.: Design rationale behind the identity metasystem architecture. In: ISSE/SECURE 2007 Securing Electronic Business Processes, pp. 117–129 (2007)
Carter, D.: Living in virtual communities: An ethnography of human relationships in cyberspace. Information, Communication and Society 8(2), 148–167 (2005)
Chi, E.H.: The social web: Research and opportunities. IEEE Computer 41(9), 88–91 (2008)
Clarke, R.: Human identification in information systems: Management challenges and public policy issues. Information Technology and People 7(4), 6–34 (1994)
Craik, K.H.: Reputation: A Network Interpretation. Oxford University Press, NY (2009)
Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security and Privacy 6(2), 24–29 (2008)
Donath, J.: Identity and deception in the virtual community. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 27–58. Routledge, London (1999)
Douceur, J.R.: The sybil attack. In: First international Workshop on Peer-To-Peer Systems (2002)
Ellison, C.M.: The nature of a useable PKI. Computer Networks: The International Journal of Computer and Telecommunications Networking 31(9), 823–830 (1999)
Figueiredo, R., Boykin, P.O., Juste, P.S., Wolinsky, D.: Social VPNs: Integrating overlay and social networks for seamless P2P networking. In: IEEE WETICE/COPS 2008 (2008)
Gutwirth, S.: Beyond identity? Identity in the Information Society 1(1), 123–133 (2008)
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94–100 (2007)
Krasnova, H., Gnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity in the Information Society 2(1), 39–63 (2009)
Marshall, A.M., Tompsett, B.C.: Identity theft in an online world. Computer Law and Security Report 21(2), 128–137 (2005)
Mitnick, K.D., Simon, W.L., Wozniak, S.: The Art of Deception. Wiley, NY (2002)
Nabeth, T.: Social web and identity: A likely encounter. Identity in the Information Society 2(1), 1–5 (2009)
Nagaraja, S., Anderson, R.: The snooping dragon: Social-malware surveillance of the Tibetan movement. Tech. Rep. UCAM-CL-TR-746, University of Cambridge Computer Laboratory (2009)
O’Hara, K., Tuffield, M.M., Shadbolt, N.: Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1(1), 155–172 (2008)
Ramachandran, A.V., Feamster, N.: Authenticated out-of-band communication over social links. In: First Workshop on Online Social Networks, pp. 61–66 (2008)
Recordon, D., Fitzpatrick, B.: Openid authentication 1.1. http://openid.net/specs/openid-authentication-1_1.html (2006)
Soleymani, B., Maheswaran, M.: Social authentication protocol for mobile phones. In: 2009 International Conference on Computational Science and Engineering, pp. 436–441 (2009)
Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association 3(1) (2006)
Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15–28 (2009)
Tufekci, Z.: Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology Society 28(1), 20–36 (2008)
Xie, B.: The mutual shaping of online and offline social relationships. Information Research 13(3) (2008)
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Computer Communication Review 36(4), 267–278 (2006)
Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy, pp. 3–17 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Maheswaran, M., Ali, B., Ozguven, H., Lord, J. (2010). Online Identities and Social Networking. In: Furht, B. (eds) Handbook of Social Network Technologies and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-7142-5_11
Download citation
DOI: https://doi.org/10.1007/978-1-4419-7142-5_11
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4419-7141-8
Online ISBN: 978-1-4419-7142-5
eBook Packages: Computer ScienceComputer Science (R0)