Abstract
This paper introduces an unobtrusive method and distributed solution set to aid users of on-line social networking sites, by creating a trusted environment in which every member has the ability to identify each other within their private social network by name, gender, age, location, and the specific usage patterns adopted by the group. Utopia protects members by understanding how the social network is created and the specific aspects of the group that make it unique and identifiable. The main focus of Utopia is the protection of the group, and their privacy within a social network from predators and spammers that characteristically do not fit within the well defined usage boundaries of the social network as a whole. The solution set provides defensive, as well as offensive tools to identify these threats. Once identified, client desktop tools are used to prevent these predators from further interaction within the group. In addition, offensive tools are used to determine the origin of the predator to allow actions to be taken by automated tools and law enforcement to alleviate the threat.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cyberbullying (2009), http://www.cyberbullying.org/
Hinduja, S., Patchin, J.W.: Bullying Beyond the Schoolyard Preventing and Responding to Cyberbullying. Corwin Press (2009)
Patchin, J.W., Hinduja, S.: Bullies move beyond the schoolyard: A preliminary look at cyberbullying. Youth Violence and Juvenile Justice 4(2), 148–169 (2006)
Hinduja, S., Patchin, J.W.: Cyberbullying: An Exploratory Analysis of Factors Related to Offending and Victimization. Deviant Behavior 29(2), 129–156 (2008)
Hinduja, S., Patchin, J.W.: Offline Consequences of Online Victimization: School Violence and Delinquency. Journal of School Violence 6(3), 89–112 (2007)
Reuters, Fatal MySpace internet hoax mother is charged (2008), http://www.news.com.au/heraldsun/story/0,21985,23711115-663,00.html
Lindsay, S.: Boy who posed with guns convicted, Rocky Mountain News (2006), http://www.rockymountainnews.com/drmn/local/article/0,1299,DRMN_15_4595681,00.html
MySpace exposes sex predators (5/22/2007), http://www.news.com.au/heraldsun/story/0,21985,21775032-11869,00.html
Commonwealth of Massachusetts, Joint Statement on Key Principles of Social Networking Sites Safety (2008), http://www.mass.gov/Cago/docs/press/2008_01_14_myspace_agreement_attachment1.pdf
MySpace, ParentCare (2009), http://www.myspace.com/parentcare
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gauvin, W., Liu, B., Fu, X., Wang, J. (2009). Utopia Providing Trusted Social Network Relationships within an Un-trusted Environment. In: Liu, B., Bestavros, A., Du, DZ., Wang, J. (eds) Wireless Algorithms, Systems, and Applications. WASA 2009. Lecture Notes in Computer Science, vol 5682. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03417-6_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-03417-6_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-03416-9
Online ISBN: 978-3-642-03417-6
eBook Packages: Computer ScienceComputer Science (R0)