THE PAPER | A Review on Online Social Network: Issues & Challenges

The Usage of Online Social Network (OSN) is increasing day by day where a large number of users publicly access their friend’s link and post any message on the wall. OSN enables different user’s to use the services with a security of using these messages on the user’s wall.

By Rahul Nema and Anjana Pandey
Department of Information Technology, SOIT, RGPV, Bhopal, India


Image Attribute: Social Network Links / Source: The NextWeb


Abstract:


The Usage of Online Social Network (OSN) is increasing day by day where a large number of users publicly access their friend’s link and post any message on the wall. OSN enables different user’s to use the services with a security of using these messages on the user’s wall. Hence various techniques are implemented for the filtering of these wall messages, but there are still various issues and challenges found during the usage of these techniques used in OSN. Here in this paper various issues and challenges from various techniques are discussed and hence on the basis of various issues a new and efficient technique is implemented in future.

A social network can be explained as a social structure consisting of individuals or organizations. These are related each other by some means. The social network perspective provides a set of methods for analyzing the structure of social entities and the theories thereby explaining the patterns in the structures. These structures use social network analysis and identify local and global patterns, locate influential entities and examine network dynamics. The approaches used in social networks enable to know social interaction being visualized first and investigated with the help of properties of relations between the units and not the unit’s properties itself. The network configurations and network analytics are formed by singular or combination relations in social networks. Social networking service basically provides platform for edifice of social networks or social relations between users sharing interests, activities, backgrounds etc. Social network service provider enables the user to maintain profile containing his or her social links and other add ons.

Therefore with the help of social networks, users are able to build a public profile and maintain list of users for sharing connections and can cross and view the connections in the system. Social network services are generally web based, facilitating the users or the clients to interact over the Internet that can be in the form of e-mail, instant message etc. Social network provides and allows using multiple information and communication tools in the form of mobile connectivity, photo, video, sharing etc.



Community services provided by social networks are group centered and sometimes even social networks are termed as individual centered service. Social networks are generally divided into communities and groups which consist of users having same likes, features, dislikes, interests etc. The main types of social networking services are those which are categorized or divided in groups or communities of users like schoolmates, politicians, celebrities etc. and a giving a recommendation system linked with the trust of users. The widely used Social networks are Facebook, Google+, YouTube, LinkedIn, Instagram, Pinterest, Tumblr and Twitter.

Each user maintains its own social network that may be online or offline and contains friends, families and people whom they are acquainted with. The fundamental aim lying behind online social networking services is to make users’ social networks visible to others who are not connected to his/her immediate network. Social network held people together by friendship, classmates, colleagues, business partners, etc. having pre-estab- lished interpersonal relationships. The connections between the users are generally formed one at a time. The primary reason that lies behind the people is to join a social networking site for maintaining old relationships with others and making new ones for expanding their network.

Social networks act as unique service in which the users can collectively recognize others if they are fake. The users also generally do not compartmentalize their life i.e. they don’t have only one social network.

Communities in the social network are held together by common interest among the users. The users may possess common hobby for which the other community members may be passionate, may have a common goal, similar lifestyle, geographical location etc. Thereby in social networks users exhibit different influence and different behavior [1] .

Internet contains information of various types and kinds. For gaining knowledge from these data, various users exist on internet and continue to use it. The users generally share, disseminate and communicate multiple type of information between them. The information is in the form of texts, audio, video, images etc. [2] . These users may belong to multiple communities consisting of similar type of users in behavior influencing each other for sharing various types of data.

Social Networks is visualized in the form of internet service helping the user to build a networks over the internet which is social in nature and builds relations with other users for sharing of interests and participate in multiple activities with the users who are characterized by communities.

Communities over the social networks discover groups of interacting objects in the form of nodes formalizing the relations between them. For example a community in a social network can be defined as groups of friends attending the same school or people of the same home town etc. [3] . The communities correspond to users having similar scientific disciplines, family, friends, similar interests etc.

Network community’s helps in study of functionally related objects for analysis and for studying interactions between the modules, predict unobserved connections etc. A community structure property is contained by social networks which is explained in the form of groups of vertices having denser connections inside each group are divided and the fewer connections which crosses groups division where vertices and connections represent network users and social interactions respectively.

Members of communities of a social network i.e. nodes share things between them in common like interests in the field of photography, movies, music or political topics thereby interacting more frequently with each other as compared with the members outside of their community structure. Community detection therefore in a network is explained on the basis of gathering of network vertices into groups in which nodes in each group connect densely on the inner side and sparsely on outer side [4] [5] .

Community kernel detection problem has practical applications like representative user finding, friend recommendation, network visualization, marketing etc. The problem being considered as non-trivial in nature has a set of challenges in which true influential user’s identification is hard. The number of followers of the individual is used as indicator but its count contains no information about who follows them in return. Influential users interacting with each other is slightly non clear process and its process of taking place can be explained with the example like there is half probability of an actress or any other type of user to follow another actress or a sports person or politician etc.

Basically in real world social networks with thousands of millions of nodes are increasing with rapid growth. That’s why we need an algorithm with high scalability to resolve the dilemma of community. For this, method kernel detection is required with subtasks so that it can identify influential (kernel) members and detecting the formation of community kernels.

The nodes (or vertices) in social Networks are the typical systems which represent entities that have some relationships. Web graphs, telecommunication networks, genetic networks, trade networks etc. are examples of such systems other than social networks. Generally the recognition of cluster of vertices within which the connections (or edges) are numerous and between which they are rare are symbolized by community detection or clustering.

The methods like Spectral clustering are used for clustering which are basically based on the eigen decomposition of a Laplacian matrix that is derived from the data. This gave us an idea of being expansion of the clustering model to out of sample nodes. Thus on a small subset of whole graph the clustering model can be trained and visualized and so while dealing with huge and complex networks the method could be applied to the rest of the network in a learning agenda platform. The problem of online clustering of huge and raising networks can be easily resolved with out-of-sample extension in the community detection field algorithm. Thus when every new vertex is arriving in a data stream, it doesn’t have to run on a new graph on the application of the above process [6].

Social influence affects the social networks governing the dynamics of social networks. Users gets influenced by other users when sharing information, exchanging data, messaging etc. and forms communities in which users are influenced by similarities.

Social network analysis focuses upon macro level models in the form of degree distributions, clustering coefficient, communities, small world effect etc. Social influences usually defines that a user may have higher influence over field or a topic than other user and the other may higher influence with completely different field, topic or interest. This arises a fact that users are needed to be analyzed based on influences for forming community. Social influence does not explains the global measure of importance of nodes or users and it only defines the measure on the links in between nodes.


Conclusion:
Since online Social Network enables various users to interact easily and quickly. Although there are various techniques implemented for the community detection and message filtering but the techniques implemented contain various issues and problems due to that it’s efficient and accuracy decreases. Here in this paper a complete survey of all such techniques is discussed and analyzed, hence on the basis of various issue a new and efficient technique is implemented.
Cite this Paper:
Rahul Nema, Anjana Pandey (2016) A Review on Online Social Network: Issues & Challenges. Social Networking,05,57-61. doi: 10.4236/sn.2016.52006

Copyright © 2016 by authors and Scientific Research Publishing Inc.

This work is licensed under the Creative Commons Attribution International License (CC BY).
References:
1. Wang, L.R., Lou, T.C., Tang, J. and Hopcroft, J.E. (2011) Detecting Community Kernels in Large Social Networks. IEEE 11th International Conference on Data Mining (ICDM), Vancouver, 11-14 December 2011, 784-793.
2. Choudhary, N.S., Yadav, H. and Jain, A. (2014) Message Filtering Techniques in Social Networks over Web Environment—A Survey. International Journal of Emerging Technology and Advanced Engineering, 4, 696-701.
3. Ahn, Y.-Y., Bagrow, J.P. and Lehmann, S. (2010) Link Communities Reveal Multi-Scale Complexity in Networks. Nature, 466, 761-764. http://dx.doi.org/10.1038/nature09182
4. Palla, G., Pollner, P., Barabasi, A. and Vicsek, T. (2009) Social Group Dynamics in Networks. Adaptive Networks, Part of the series Understanding Complex Systems, 11-38.http://dx.doi.org/10.1007/978-3-642-01284-6_2
5. Girvan, M. and Newman, M.E.J. (2002) Community Structure in Social and Biological Networks. PNAS, 99. http://dx.doi.org/10.1073/pnas.122653799
6. Langone, R., Alzate, C. and Suykens, J.A.K. (2011) Kernel Spectral Clustering for Community Detection in Complex Networks. The 2012 International Joint Conference on Neural Networks (IJCNN), Brisbane, 10-15 June 2012, 1-8.
7. Yang, J., McAuley, J. and Leskovec, J. (2013) Community Detection in Networks with Node Attributes. Data Mining ICTM 2013 International Conference, 1151-1156.
8. Leskovec, J., Lang, K.J. and Mahoney, M.W. (2010) Empirical Comparison of Algorithms for Network Community Detection. International World Wide Web Conference Committee (IW3C2), Raleigh, 26-30 April 2010. http://dx.doi.org/10.1145/1772690.1772755
9. Xu, K.S., Kliger, M. and Hero III, A.O. (2011) Tracking Communities in Dynamic Social Networks. Springer Chapter- 10.
10. Nguyen, N.P., Dinh, T.N., Xuan, Y. and Thai, M.T. (2009) Adaptive Algorithms for Detecting Community Structure in Dynamic Social Networks. Proceedings of IEEE INFOCOM, Shanghai, 10-15 April 2011, 2282-2290.
11. Lancichinetti, A. and Fortunato, S. (2009) “Community Detection Algorithms: A Comparative Analysis. Physical Review E, 80, 056117.
12. Mishra, N., Schreiber, R., Stanton, I. and Tarjan, R.E. (2009) Finding Strongly-Knit Clusters in Social Networks. Internet Mathematics, 2 November 2009.
13. Tang, J., Sun, J.M., Wang, C. and Yang, Z. (2009) Social Influence Analysis in Large-Scale Networks. KDD’09, Paris, 28 June-1 July 2009, 807-815.http://dx.doi.org/10.1145/1557019.1557108
Name

-51,1,3D Technology,2,5G,9,Abkhazia,2,Abortion Laws,1,Academics,10,Accidents,21,Activism,1,Adani Group,5,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,112,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,2,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,81,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,70,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,7,Australia,57,Austria,1,Automation,13,Automotive,129,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,3,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,104,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1203,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,54,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,579,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,23,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,44,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,12,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,1,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,16,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,115,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,2,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,1,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,1,Digital Economy,10,Digital Marketing,6,Digital Transformation,11,Diplomacy,14,Diplomatic Row,3,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,3,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,109,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,53,Education,65,EFTA,1,Egypt,27,Election Disinformation,1,Elections,44,Electric Vehicle,15,Electricity,7,Electronics,8,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,14,European Union,233,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1373,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,59,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,1,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,33,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,22,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,7,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,9,Georgia,11,Georgian,1,geospatial,9,Geothermal,2,Germany,69,Ghana,3,Gibratar,1,Gig economy,1,Global Perception,1,Global Trade,96,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,GPS,1,Greater Asia,174,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,1,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,1,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,4,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,661,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,27,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,6,Indonesia,19,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,34,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,205,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,91,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,82,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,7,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,15,Marijuana,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,10,Military Service,2,Military-Industrial Complex,3,Mining,15,Missile Launching Facilities,6,Missile Systems,56,Mobile Apps,3,Mobile Communications,11,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,2,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,15,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1267,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,53,North Korea,58,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,4,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,382,Oil Gas,7,Oil Price,73,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,129,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,691,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,12,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,7,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,3,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,6,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,49,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,24,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,317,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,5,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,392,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,18,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,47,South Asia,472,South China Sea,36,South East Asia,76,South Korea,62,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,32,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,653,Think Tank,317,Tibet,3,TikTok,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,19,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,139,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,25,Ummah,1,UNCLOS,7,Unemployment,1,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,82,United Nations,28,United States,760,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,21,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,32,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: THE PAPER | A Review on Online Social Network: Issues & Challenges
THE PAPER | A Review on Online Social Network: Issues & Challenges
The Usage of Online Social Network (OSN) is increasing day by day where a large number of users publicly access their friend’s link and post any message on the wall. OSN enables different user’s to use the services with a security of using these messages on the user’s wall.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJMdUCa2WdqKBlHUWw32sIvXva8YjOsc_YHcG2miqXzeHry-E22bfY-SxjR9r2ebdO30thSJ4MjeD8awsGiSuPKsiHMKg6DB50TosVLbBHivYqDhrNXBL-No8DP5eSzQj0CWI_JyiWz0in/s640/social-network-links.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJMdUCa2WdqKBlHUWw32sIvXva8YjOsc_YHcG2miqXzeHry-E22bfY-SxjR9r2ebdO30thSJ4MjeD8awsGiSuPKsiHMKg6DB50TosVLbBHivYqDhrNXBL-No8DP5eSzQj0CWI_JyiWz0in/s72-c/social-network-links.jpg
IndraStra Global
https://www.indrastra.com/2016/04/PAPER-Review-on-Online-Social-Network-Issues-and-Challenges-002-04-2016-0051.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2016/04/PAPER-Review-on-Online-Social-Network-Issues-and-Challenges-002-04-2016-0051.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content