IDEAS home Printed from https://ideas.repec.org/a/ids/ijbisy/v44y2023i2p285-302.html
   My bibliography  Save this article

The study of PGP web of trust based on social network analysis

Author

Listed:
  • Victor Chang
  • Lina Xiao
  • Anastasija Nikiforova
  • Qianwen Ariel Xu
  • Ben S.C. Liu

Abstract

This paper aims to explore the patterns of online interaction of users of the pretty good privacy (PGP) algorithm to identify the most important and influential users in the social network. While PGP is widely used in protecting email privacy, there are some encryption defects that can raise users' concerns about data privacy and security. It is therefore essential to identify the most influential and active users who are trusted widely, getting numerous keys in the PGP web of trust. However, it is not always known whether the user actually gained trust from others or it is one who illegally forged the keys. In order to identify the most important users in the PGP network, social network analysis (SNA) is used to analyse their online interaction conditions. Along with the most traditional centrality analysis, a less frequent used K-means clustering analysis is also conducted to obtain more precise and accurate results. The SNA results show that: 1) PGP algorithm users' online interaction patterns are rather different, which include both frequent versus isolated; 2) people with higher centrality use the PGP algorithm more frequently and may become the target peeks to seek; 3) in the analysed network, all important nodes are in the same cluster when applying K-means model to divide the community.

Suggested Citation

  • Victor Chang & Lina Xiao & Anastasija Nikiforova & Qianwen Ariel Xu & Ben S.C. Liu, 2023. "The study of PGP web of trust based on social network analysis," International Journal of Business Information Systems, Inderscience Enterprises Ltd, vol. 44(2), pages 285-302.
  • Handle: RePEc:ids:ijbisy:v:44:y:2023:i:2:p:285-302
    as

    Download full text from publisher

    File URL: http://www.inderscience.com/link.php?id=134956
    Download Restriction: Access to full text is restricted to subscribers.
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ids:ijbisy:v:44:y:2023:i:2:p:285-302. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Sarah Parker (email available below). General contact details of provider: http://www.inderscience.com/browse/index.php?journalID=172 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.