Skip to main content

Online Identities and Social Networking

  • Chapter
  • First Online:
Handbook of Social Network Technologies and Applications

Abstract

Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ba, S.: Establishing online trust through a community responsibility system. Decision Support Systems 31(3), 323–336 (2001)

    Article  Google Scholar 

  2. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International Conference on World Wide Web, pp. 551–560 (2009)

    Google Scholar 

  3. Bonneau, J., Anderson, J., Anderson, R., Stajano, F.: Eight friends are enough: Social graph approximation via public listings. In: SNS ’09: Second ACM EuroSys Workshop on Social Network Systems, pp. 13–18 (2009)

    Google Scholar 

  4. Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1) (2007)

    Google Scholar 

  5. Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: Somebody you know. In: CCS ’06: 13th ACM conference on Computer and communications security, pp. 168–178 (2006)

    Google Scholar 

  6. Burkhalter, B.: Reading race online: Discovering racial identity in usenet discussions. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 60–75. Routledge, London (1999)

    Google Scholar 

  7. Cameron, K., Jones, M.B.: Design rationale behind the identity metasystem architecture. In: ISSE/SECURE 2007 Securing Electronic Business Processes, pp. 117–129 (2007)

    Google Scholar 

  8. Carter, D.: Living in virtual communities: An ethnography of human relationships in cyberspace. Information, Communication and Society 8(2), 148–167 (2005)

    Article  Google Scholar 

  9. Chi, E.H.: The social web: Research and opportunities. IEEE Computer 41(9), 88–91 (2008)

    Article  Google Scholar 

  10. Clarke, R.: Human identification in information systems: Management challenges and public policy issues. Information Technology and People 7(4), 6–34 (1994)

    Article  Google Scholar 

  11. Craik, K.H.: Reputation: A Network Interpretation. Oxford University Press, NY (2009)

    Google Scholar 

  12. Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security and Privacy 6(2), 24–29 (2008)

    Article  Google Scholar 

  13. Donath, J.: Identity and deception in the virtual community. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 27–58. Routledge, London (1999)

    Google Scholar 

  14. Douceur, J.R.: The sybil attack. In: First international Workshop on Peer-To-Peer Systems (2002)

    Book  MATH  Google Scholar 

  15. Ellison, C.M.: The nature of a useable PKI. Computer Networks: The International Journal of Computer and Telecommunications Networking 31(9), 823–830 (1999)

    Article  Google Scholar 

  16. Figueiredo, R., Boykin, P.O., Juste, P.S., Wolinsky, D.: Social VPNs: Integrating overlay and social networks for seamless P2P networking. In: IEEE WETICE/COPS 2008 (2008)

    Google Scholar 

  17. Gutwirth, S.: Beyond identity? Identity in the Information Society 1(1), 123–133 (2008)

    Article  Google Scholar 

  18. Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94–100 (2007)

    Article  Google Scholar 

  19. Krasnova, H., Gnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity in the Information Society 2(1), 39–63 (2009)

    Article  Google Scholar 

  20. Marshall, A.M., Tompsett, B.C.: Identity theft in an online world. Computer Law and Security Report 21(2), 128–137 (2005)

    Article  Google Scholar 

  21. Mitnick, K.D., Simon, W.L., Wozniak, S.: The Art of Deception. Wiley, NY (2002)

    Google Scholar 

  22. Nabeth, T.: Social web and identity: A likely encounter. Identity in the Information Society 2(1), 1–5 (2009)

    Article  Google Scholar 

  23. Nagaraja, S., Anderson, R.: The snooping dragon: Social-malware surveillance of the Tibetan movement. Tech. Rep. UCAM-CL-TR-746, University of Cambridge Computer Laboratory (2009)

    Google Scholar 

  24. O’Hara, K., Tuffield, M.M., Shadbolt, N.: Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1(1), 155–172 (2008)

    Article  Google Scholar 

  25. Ramachandran, A.V., Feamster, N.: Authenticated out-of-band communication over social links. In: First Workshop on Online Social Networks, pp. 61–66 (2008)

    Google Scholar 

  26. Recordon, D., Fitzpatrick, B.: Openid authentication 1.1. http://openid.net/specs/openid-authentication-1_1.html (2006)

  27. Soleymani, B., Maheswaran, M.: Social authentication protocol for mobile phones. In: 2009 International Conference on Computational Science and Engineering, pp. 436–441 (2009)

    Google Scholar 

  28. Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association 3(1) (2006)

    Google Scholar 

  29. Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15–28 (2009)

    Google Scholar 

  30. Tufekci, Z.: Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology Society 28(1), 20–36 (2008)

    Google Scholar 

  31. Xie, B.: The mutual shaping of online and offline social relationships. Information Research 13(3) (2008)

    Google Scholar 

  32. Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Computer Communication Review 36(4), 267–278 (2006)

    Article  Google Scholar 

  33. Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy, pp. 3–17 (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Muthucumaru Maheswaran .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Maheswaran, M., Ali, B., Ozguven, H., Lord, J. (2010). Online Identities and Social Networking. In: Furht, B. (eds) Handbook of Social Network Technologies and Applications. Springer, New York, NY. https://doi.org/10.1007/978-1-4419-7142-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-1-4419-7142-5_11

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4419-7141-8

  • Online ISBN: 978-1-4419-7142-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics