WEEK 08 UPDATE
This week, I was in a hurry to complete the Annotated Bibliography. Because it was essential to read the articles and take the necessary information out of them. Even, while writing the literature review I paid more attention to plagiarism as we were supposed to take details from the research articles. Meanwhile. Now I can provide a conclusion for the bibliography. Overall, it is essential to follow the facilitated security settings in the websites by all the social network users. Nowadays, the social network website developers are putting an immense effort to provide high-quality security for the user’s sensitive information. They provide the security and privacy settings to the user to maintain it as they want. Yet, the poor knowledge regarding the settings or information technology some users are unable to use the given security facilities. The user awareness is highly expected in social networks to avoid the security issues. In addition, adults are advised to help the children or any user who got affected due to the bullying issue. Be that as it may, there are certain count measures to use the social network as solutions for the security issues. The behavior of the user, maturity of the children and technological consideration, user awareness are required to know before step into the social networks.
WEEK 07 UPDATE
This week, the final set off scholar articles were confirmed after referring nearly 20 articles. When, considering about the recent years and appropriateness of the article it was some much difficult to finalize the articles. Nevertheless, the novel information takes out from the articles can be mentioned as follows.
To overcome from the security issues author Sanz and the team introduced this circle. The hierarchy of the circle; attacks, vulnerabilities, risks, countermeasures, asserts and threats. (Sanz, Loarden, Alvaez & Bringas, 2011)
WEEK 06 UPDATE
In this week, I had been identifying 14 research articles appropriate for the Annotated Bibliography. I found information regarding social networks issues with data analysing such as, the number of social networks uses, the age limits of the users and political usage in social networks websites. Further, with the immense popularity over the last years the users of the Social Networking websites gain an effortless opportunity to mingle with known and unknown people through internet. This has become an addiction to some of the youth users to maintain an account in social networks to sharing their personal stuffs with others and to find out about others’ lives. But, the way of writing the literature review is still not confirmed.
Saikumar, T., & Sriramya, P. SECURITY ISSUES IN SOCIAL NETWORKS.
WEEK 5 UPDATE
This week I was in a little bit hurry to complete several assignments. In simultaneously, I followed some journal articles within the busy schedules. Still I didn’t finalize the research articles to be used for the annotated bibliography. Hence, I followed several articles related to the topic. Then, I realized that the security issues in the social networks getting more exciting with novel research issues identified from the articles. At the beginning, there were four research issues as security issues, privacy issues, bullying issues and ethical issues. The followings are the new research issues and the scholar articles.
• Trust issues
• Political issues
• Identity theft
• Concluding thoughts of the youth
Anantharam, P., Henson, C. A., Thirunarayan, K., & Sheth, A. P. (2010, July). Trust model for semantic sensor and social networks: A preliminary report. In Aerospace and Electronics Conference (NAECON), Proceedings of the IEEE 2010 National (pp. 1-5). IEEE.
Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web (pp. 551-560). ACM.
Cutillo, L. A., Molva, R., & Strufe, T. (2009). Safebook: A privacy-preserving online social network leveraging on real-life trust. IEEE Communications Magazine, 47(12).
Gangopadhyay, S., & Dhar, M. D. (2014). Social networking sites and privacy issues concerning youths. Article-2 Global Media Journal-Indian Edition, Summer Issue, 5(1).
Gil de Zúñiga, H., Jung, N., & Valenzuela, S. (2012). Social media use for news and individuals’ social capital, civic engagement and political participation. Journal of Computer‐Mediated Communication, 17(3), 319-336.
I suggest these articles, for further interesting about social networks.