
Modeling Authentication Mechanisms on Social Media Accounts
Author(s) -
Prof. Prachiti Deshpande
Publication year - 2022
Publication title -
the philippine statistician (quezon city)
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.101
H-Index - 2
ISSN - 2094-0343
DOI - 10.17762/msea.v71i1.48
Subject(s) - internet privacy , authentication (law) , computer science , order (exchange) , social media , logo (programming language) , exploit , world wide web , computer security , personally identifiable information , advertising , business , finance , programming language
Fake pages are used to exploit important categories, by using personal photos or personal information, in order to spread lies and discredit. This is illegal and threatens privacy. So, dealing with social networking sites has become a dangerous and risky thing. Hence, each important category seeks to have its pages on social networks distinctive and authenticated in order to attract real followers, in addition to removing all fake pages that use the name or pictures in order to mislead the followers. The authentication mechanisms on social media accounts differ from one site to another, but they are similar in terms of the objective, which is authenticating personal pages, in addition to showing a logo that distinguishes these pages from other pages. This mechanism requires everyone to follow specific procedures to complete authentication. Hence, obtaining a trust logo is not easy, accompanied by complicated procedures that are difficult to follow by normal users, unlike the important personalities who usually have managers who maintain their daily work and accounts.