Skip to main content

Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2009)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 5682))

  • 937 Accesses

Abstract

This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every member has the ability to identify each other within their private social network by name, gender, age, location, and the specific usage patterns adopted by the group. Utopia protects members by understanding how the social network is created and the specific aspects of the group that make it unique and identifiable. The main focus of Utopia is the protection of the group, and their privacy within a social network from predators and spammers that characteristically do not fit within the well defined usage boundaries of the social network as a whole. The solution set provides defensive, as well as offensive tools to identify these threats. Once identified, client desktop tools are used to prevent these predators from further interaction within the group. In addition, offensive tools are used to determine the origin of the predator to allow actions to be taken by automated tools and law enforcement to alleviate the threat.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cyberbullying (2009), http://www.cyberbullying.org/

  2. Hinduja, S., Patchin, J.W.: Bullying Beyond the Schoolyard Preventing and Responding to Cyberbullying. Corwin Press (2009)

    Google Scholar 

  3. Patchin, J.W., Hinduja, S.: Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice 4(2), 148–169 (2006)

    Article  Google Scholar 

  4. Hinduja, S., Patchin, J.W.: Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization. Deviant Behavior 29(2), 129–156 (2008)

    Article  Google Scholar 

  5. Hinduja, S., Patchin, J.W.: Offline Consequences of Online Victimization: School Violence and Delinquency. Journal of School Violence 6(3), 89–112 (2007)

    Article  Google Scholar 

  6. Reuters, Fatal MySpace internet hoax mother is charged (2008), http://www.news.com.au/heraldsun/story/0,21985,23711115-663,00.html

  7. Lindsay, S.: Boy who posed with guns convicted, Rocky Mountain News (2006), http://www.rockymountainnews.com/drmn/local/article/0,1299,DRMN_15_4595681,00.html

  8. MySpace exposes sex predators (5/22/2007), http://www.news.com.au/heraldsun/story/0,21985,21775032-11869,00.html

  9. Commonwealth of Massachusetts, Joint Statement on Key Principles of Social Networking Sites Safety (2008), http://www.mass.gov/Cago/docs/press/2008_01_14_myspace_agreement_attachment1.pdf

  10. MySpace, ParentCare (2009), http://www.myspace.com/parentcare

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gauvin, W., Liu, B., Fu, X., Wang, J. (2009). Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03417-6_55

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03416-9

  • Online ISBN: 978-3-642-03417-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics